With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| Install WireGuard via whatever package manager you use. For me, I use apt. | |
| $ sudo add-apt-repository ppa:wireguard/wireguard | |
| $ sudo apt-get update | |
| $ sudo apt-get install wireguard | |
| MacOS | |
| $ brew install wireguard-tools | |
| Generate key your key pairs. The key pairs are just that, key pairs. They can be |
| #!/usr/bin/env python | |
| import sys | |
| phrase = sys.argv[1] | |
| parts = [l + l.upper() for l in phrase.lower()] | |
| regex = ''.join(['[%s]' % part for part in parts]) | |
| print regex |
| #!/bin/bash -e | |
| # see related issue: https://github.com/rundeck/rundeck/issues/357 | |
| # export required vars | |
| export RD_URL=http://localhost:4440 RD_USER=admin RD_PASSWORD=admin RD_HTTP_TIMEOUT=300 | |
| # make sure rd & jq commands are in the PATH | |
| which -- rd jq >/dev/null | |
| del_executions() { |