Seth
netspionage
Seth | netspionage | |
---|---|---|
2 | 2 | |
1,331 | 128 | |
0.0% | - | |
0.0 | 0.0 | |
about 1 year ago | about 1 year ago | |
Python | Python | |
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Seth
-
RDP is susceptible to a transparent Net-NTLMv2 hash-stealing attack. When disclosed, Microsoft responded: “not a vulnerability, […] by design”.
https://github.com/SySS-Research/Seth used to work haven’t used it in years though. Same with responder though
-
Cracking RDP NLA Supplied Credentials for Threat Intelligence
I did this in 2017: https://github.com/SySS-Research/Seth
netspionage
What are some alternatives?
pyrdp - RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
spiderfoot - SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
wifipumpkin3 - Powerful framework for rogue access point attack.
sherlock - 🔎 Hunt down social media accounts by username across social networks
elmocut - Eye candy ARP spoofer for Windows
urlRecon - :pencil: urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
RITM - Roast in the Middle
xepor - Xepor, a web routing framework for reverse engineers and security researchers, brings the best of mitmproxy & Flask