Commit Graph

280 Commits (d76ce31f57b6dc4178fb4d0a980c7f793391fc08)

Author SHA1 Message Date
byt3bl33d3r d76ce31f57 Added issue template 2016-07-03 12:12:19 -06:00
byt3bl33d3r 2e102130b1 Fixed unhandled traceback occurring when an invalid WMI namespace is
specified
2016-07-02 23:12:51 -06:00
byt3bl33d3r 9c1259b60f Fixed a bunch errors in the SMB Spider (closes #117)
Additionally, regexes are now pre-compiled before starting the spider
2016-07-02 22:47:03 -06:00
byt3bl33d3r 74f746592a Initial commit of the enum_chrome module (resolves half of #112)
The modyle uses Mimikatz's new DPAPI Chrome module to decrypt saved
chrome credentials

Additionally a new version of Invoke-Mimikatz.ps1 script has been added
that contains the latest Mimikatz binaries and a patch for it to work
when injected
(https://github.com/PowerShellMafia/PowerSploit/issues/147)
2016-06-29 00:53:41 -06:00
byt3bl33d3r f189b50a5f Version bump to 3.1.2
Updated install instructions and setup.py since impacket 0.9.15 has been
released!
2016-06-28 16:28:49 -06:00
byt3bl33d3r 928c9af721 Fixed if statement in msf credential import code 2016-06-25 11:11:29 -06:00
byt3bl33d3r 04da664df7 Updated setup.py 2016-06-25 11:09:48 -06:00
byt3bl33d3r 53b49a7c3a Added support for importing Metasploit credentials (closes issue #89) 2016-06-17 21:44:40 -06:00
byt3bl33d3r d44d927372 Initial commit for the mem_scraper and powerview modules 2016-06-17 20:31:31 -06:00
byt3bl33d3r 6056ce83db Initial commit for the powerview and memscraper modules
The powerview module will replace all of the get_net* modules
Memscraper module stil has a bug which i'm working on
2016-06-17 01:34:38 -06:00
byt3bl33d3r 58edfe18f3 Code cleanup of the execute method in the Connection class in
connection.py

Additionally, since the smbexec execution method seems to be detected by
a number of AV HIPS'es, i've switched the default execution method order
to:
1. wmiexec
2. atexec
3. smbexec

Furthermore, the method argument in the execute function now accepts a
list of exec methods.
2016-06-14 18:58:19 -06:00
byt3bl33d3r 7b0b06af39 Fixed log creation in tokens.py module 2016-06-14 17:49:20 -06:00
byt3bl33d3r 062db9c354 Added a VERY SMALL TAG ZOMG 2016-06-08 22:03:48 -06:00
byt3bl33d3r 48e61cd883 Typos again 2016-06-08 21:59:55 -06:00
byt3bl33d3r b4559abaac Version bump 2016-06-08 21:51:25 -06:00
byt3bl33d3r db223b583a Some code cleanup, bug fixes and re-added the config file
* For some reason the config file got lost in between version bumps, re-added it
* Improved the logic in first_run.py, it will now autodetect missing files and will copy/generate them accordinglu
* Code cleanup in cmedb.py and bug fixes in crackmapexec.py
2016-06-08 21:44:45 -06:00
byt3bl33d3r fa42461a3c Typo's 2016-06-07 01:18:05 -06:00
byt3bl33d3r cee2f20368 Update README.md 2016-06-07 01:16:57 -06:00
byt3bl33d3r 88c517eb12 Update README.md 2016-06-07 00:51:40 -06:00
byt3bl33d3r 18e3914731 Cleaned up the module loading code 2016-06-05 14:43:51 -06:00
byt3bl33d3r 89e08605f4 Update README.md 2016-06-04 12:55:50 -06:00
byt3bl33d3r 67c26ccf41 Changed version number for Pypi and updated Install instructions again 2016-06-04 03:13:23 -06:00
byt3bl33d3r d4e5633437 setup.py wierdness 2016-06-04 02:39:58 -06:00
byt3bl33d3r 1e281bd638 Got rid of some left over merger cruft 2016-06-04 02:18:17 -06:00
byt3bl33d3r 4175122463 Updated README with better install instructions 2016-06-04 02:12:04 -06:00
byt3bl33d3r a7b5b17252 Updated README with install instructions 2016-06-04 02:05:57 -06:00
byt3bl33d3r 5b8b255278 Forgot to change the package description 2016-06-04 01:48:00 -06:00
byt3bl33d3r ef91622045 Updated usage in README 2016-06-04 01:24:22 -06:00
byt3bl33d3r ca9e272f26 Resolved merge conflict 2016-06-04 01:21:18 -06:00
byt3bl33d3r 838cc29634 Merged changes 2016-06-04 01:18:20 -06:00
byt3bl33d3r 23d8a6517f Refactoring for packiging is now complete! 2016-06-04 01:13:38 -06:00
byt3bl33d3r 68a908562a Second round of refactoring for packaging 2016-06-03 23:42:26 -06:00
byt3bl33d3r da4e55380a Added error handling for CME server in case the port is already in use.
Should resolve #109
2016-05-16 18:07:01 -06:00
byt3bl33d3r d5a7af9858 goddammit, git add bro 2016-05-16 17:48:31 -06:00
byt3bl33d3r 78484dc527 Initial structure for packaging 2016-05-16 17:48:06 -06:00
byt3bl33d3r 2c77b0c583 Since https://github.com/CoreSecurity/impacket/issues/137 is now
resolved, we can now add the architecture aware wrapper
2016-05-06 23:47:50 -06:00
byt3bl33d3r 4dc262526a Ok so for some wierd af reason the -m flag doesn't autocomplete module paths in
bash (wtf), this is only the case for the letter m (even more wtf). if
you do -p for example it autocompletes (omfg wtf) so since bash is being
a bitch for no reason, I've added the --module flag as an alternative so
it autocompletes module paths (bash go home you're drunk)
2016-04-27 19:18:16 -06:00
byt3bl33d3r 6a8ab5ef2f This commit introduces failover command execution
If a command or module fails to run using a certain execution method
(e.g wmiexec) it will automatically try another one.

This behavior can be overrided by using the --exec-method flag
2016-04-27 18:14:15 -06:00
byt3bl33d3r a6cc776a12 No reason to save output to a log file it there's no output :/ 2016-04-26 00:44:59 -06:00
byt3bl33d3r 91ab69d008 Fix for issue #106
Consolidated commands in cme_db.py
Added an option in cme_db.py to specify the database manually
2016-04-25 20:57:23 -06:00
byt3bl33d3r 95e9a6b61e Merge pull request #105 from Cat0x00/patch-1
Missing libs
2016-04-25 20:22:59 -06:00
Cat0x00 c8657ca73b Missing libs
During my tests i found out that in case of:
./crackmapexec.py 127.0.0.1 -u user -p pass --lsa 
Tool will (and it did) fail due to missing libraries. This applies to cases when the target is a legacy OS, such as WinXP or Win2k3.

I have fixed the issue by adding missing libraries. Not sure if there are any other missing libs in this file. ;]
2016-04-24 18:25:12 +03:00
byt3bl33d3r 079cf69406 Fixed bug when parsing payload module options 2016-04-21 19:59:13 -06:00
byt3bl33d3r fd42f45d7f fail 2016-04-21 19:30:59 -06:00
byt3bl33d3r 82af618800 Added the com_exec.py module based on @subTee's com scriptlet
whitelisting bypass
2016-04-21 19:29:19 -06:00
byt3bl33d3r d256444cb5 This commit should resolve issue #92
Changed the way the tokens module opens a read handle to the USERFILE
2016-04-16 19:48:07 -06:00
byt3bl33d3r a56ad587ec Revamped the mimikatz module's credential parsing (Stole it from Empire)
Implemented proper handling of hashes if only the nthash is supplied
2016-04-16 19:30:23 -06:00
byt3bl33d3r f7a45a3de7 Added instructions in case of command not found error in kali install script 2016-04-16 18:05:41 -06:00
byt3bl33d3r 21ddc51187 Made kali install script executable 2016-04-16 17:34:11 -06:00
byt3bl33d3r 424c34c4f4 Added a -y in kali install script 2016-04-16 17:30:54 -06:00