heimdal
evil-winrm
heimdal | evil-winrm | |
---|---|---|
5 | 4 | |
315 | 4,225 | |
2.2% | 2.8% | |
8.0 | 0.0 | |
13 days ago | 13 days ago | |
C | Ruby | |
GNU General Public License v3.0 or later | GNU Lesser General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
heimdal
-
Let's Kerberos
The Swedes also started their own from-scratch implementation, known as Heimdal (https://github.com/heimdal/heimdal), which has a bunch of nifty things in it including a from-scratch PKIX/x.509 implementation and a from-scratch ASN.1 compiler and library.
-
Heimdall 2.5.0 released
https://github.com/heimdal/heimdal - Heimdal Kerberos 7.8
-
Samba 4.9.5 / Windows 11 22H2 Kerberos Incompatibility - Cross posted from r/samba
Samba uses a embedded version of Heimdal and there is an open issue talking about this problem https://github.com/heimdal/heimdal/issues/1011. TLDR: Heimdal suffers from the 2038 date bug and Windows made a change in one of the requests where a datetime field now returns a date that goes beyond 2038.
-
The specs behind the specs – a deep-dive on ASN.1
https://github.com/heimdal/heimdal/tree/master/lib/asn1
evil-winrm
-
HackTheBox - Writeup Authority [Retired]
┌──(root㉿kali)-[/home/kali/hackthebox/machines-windows/authority] └─# evil-winrm -i authority.htb -u svc_ldap -p 'lDaP_1n_th3_cle4r!' Evil-WinRM shell v3.4 Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine Data: For more information, check Evil-WinRM Github: https://github.com/Hackplayers/evil-winrm#Remote-path-completion Info: Establishing connection to remote endpoint *Evil-WinRM* PS C:\Users\svc_ldap\Documents>
- Release v3.5 · Evil WinRM - This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it.
-
Active Directory in CTFs
Evil-WinRM exploits WinRM, a protocol used by system administrators on Windows servers.
- GitHub - Hackplayers/evil-winrm: The ultimate WinRM shell for hacking/pentesting
What are some alternatives?
OpenSSL - TLS/SSL and crypto library
rport - remote access and remote management
game-engine-2d - Planimeter Game Engine 2D - LÖVE-based game engine for Lua
DevChecker - Access remote Windows devices for common IT admin tasks and information
Heimdall - An Application dashboard and launcher
LAZYPARIAH - A tool for generating reverse shell payloads on the fly.
impacket - Impacket is a collection of Python classes for working with network protocols.
WhatWeb - Next generation web scanner
ruby-pwsh - A ruby gem for interacting with PowerShell
spellcheck-action - GitHub Action for checking code & Pull Requests for spelling mistakes
MIXON - Next generation cyber security research and testing software.
bashcov - Code coverage tool for Bash