With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
# Save the transcripts using the "Save Page WE" Chrome Extension | |
# This script was generated by ChatGPT | |
import sys | |
from bs4 import BeautifulSoup | |
# Check if a file was provided as a command line argument | |
if len(sys.argv) < 2: | |
print("Please provide an HTML file as a command line argument.") | |
sys.exit(1) |
import type { EditorConfig } from '@editorjs/editorjs' | |
// The image tool has no types, if using TS you'll need to define them. See below for example | |
import ImageTool from '@editorjs/image' | |
import axios from 'axios' | |
const editorOptions: EditorConfig = { | |
tools: { | |
image: { | |
class: ImageTool, | |
config: { |
#!/bin/bash | |
# | |
# NAME | |
# gcp-least-privileged - lists all Google IAM roles which contain the specified permission | |
# | |
# EXAMPLE | |
# gcp-least-privileged compute.disks.delete | |
# | |
main() { | |
local permission |
import * as bcrypt from "bcrypt"; | |
import { createCookieSessionStorage, redirect } from "remix"; | |
import { db } from "./db.server"; | |
export type LoginForm = { | |
username: string; | |
password: string; | |
}; |
# https://twitter.com/brsn76945860/status/1171233054951501824 | |
pip install mmh3 | |
----------------------------- | |
# python 2 | |
import mmh3 | |
import requests | |
response = requests.get('https://cybersecurity.wtf/favicon.ico') | |
favicon = response.content.encode('base64') |
Retrieves all of the trust relationships for this domain - Does not Grab Forest Trusts | |
([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships() | |
Grab Forest Trusts. | |
([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).GetAllTrustRelationships() | |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
#!/usr/bin/env python | |
# Copyright (c) 2012-2018 CORE Security Technologies | |
# | |
# This software is provided under under a slightly modified version | |
# of the Apache Software License. See the accompanying LICENSE file | |
# for more information. | |
# | |
# Gets logged on users via NetrWkstaUserEnum (requires admin on targets). | |
# Mostly adapted from netview.py and lookupsid.py | |
# |
A combination of my own methodology and the Web Application Hacker's Handbook Task checklist, as a Github-Flavored Markdown file