evil-winrm
impacket
evil-winrm | impacket | |
---|---|---|
4 | 25 | |
4,164 | 12,717 | |
1.3% | 0.9% | |
0.0 | 8.2 | |
16 days ago | about 11 hours ago | |
Ruby | Python | |
GNU Lesser General Public License v3.0 only | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
evil-winrm
-
HackTheBox - Writeup Authority [Retired]
┌──(root㉿kali)-[/home/kali/hackthebox/machines-windows/authority] └─# evil-winrm -i authority.htb -u svc_ldap -p 'lDaP_1n_th3_cle4r!' Evil-WinRM shell v3.4 Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine Data: For more information, check Evil-WinRM Github: https://github.com/Hackplayers/evil-winrm#Remote-path-completion Info: Establishing connection to remote endpoint *Evil-WinRM* PS C:\Users\svc_ldap\Documents>
- Release v3.5 · Evil WinRM - This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it.
-
Active Directory in CTFs
Evil-WinRM exploits WinRM, a protocol used by system administrators on Windows servers.
- GitHub - Hackplayers/evil-winrm: The ultimate WinRM shell for hacking/pentesting
impacket
- HackTheBox - Writeup Authority [Retired]
- Socket Programming - Spoofing IP Address
-
SMB Signing question
https://github.com/fortra/impacket/blob/master/examples/ntlmrelayx.py. (see the docs at the top of the program)
-
How to create SMB server from python?
The first result on google for "Python SMB server" literally has a working example
- Is there a way to transfer large files from a victim machine to my local Kali machine via the powershell php script method?
- Attn: pen testers.. What is your favorite tool?
- Impacket
-
Does anyone else get this error when trying to run the following command in the attackingkerberos room" sudo python3 GetUserSPNs.py controller.local/Machine1:Password1 -dc-ip (ip_address) - request
Impacket is now in python 3 also. https://github.com/SecureAuthCorp/impacket
-
path to domain admin
Check out impacket's ntlmrelayx: https://github.com/SecureAuthCorp/impacket/blob/master/examples/ntlmrelayx.py
- Impacket - collection of Python classes for working with network protocols.
What are some alternatives?
rport - remote access and remote management
CrackMapExec - A swiss army knife for pentesting networks
DevChecker - Access remote Windows devices for common IT admin tasks and information
proxychains - proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP.
LAZYPARIAH - A tool for generating reverse shell payloads on the fly.
Rubeus - Trying to tame the three-headed dog.
heimdal - Heimdal
impacket - Impacket is a collection of Python classes for working with network protocols. [Moved to: https://github.com/SecureAuthCorp/impacket]
WhatWeb - Next generation web scanner
ms08_067 - Updating MS08-067 Python exploit script
ruby-pwsh - A ruby gem for interacting with PowerShell
Win7Blue - Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits