impacket
evil-winrm
impacket | evil-winrm | |
---|---|---|
25 | 4 | |
12,717 | 4,173 | |
1.1% | 1.6% | |
8.2 | 0.0 | |
1 day ago | 5 days ago | |
Python | Ruby | |
GNU General Public License v3.0 or later | GNU Lesser General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
impacket
- HackTheBox - Writeup Authority [Retired]
- Socket Programming - Spoofing IP Address
-
SMB Signing question
https://github.com/fortra/impacket/blob/master/examples/ntlmrelayx.py. (see the docs at the top of the program)
-
How to create SMB server from python?
The first result on google for "Python SMB server" literally has a working example
- Is there a way to transfer large files from a victim machine to my local Kali machine via the powershell php script method?
- Attn: pen testers.. What is your favorite tool?
- Impacket
-
Does anyone else get this error when trying to run the following command in the attackingkerberos room" sudo python3 GetUserSPNs.py controller.local/Machine1:Password1 -dc-ip (ip_address) - request
Impacket is now in python 3 also. https://github.com/SecureAuthCorp/impacket
-
path to domain admin
Check out impacket's ntlmrelayx: https://github.com/SecureAuthCorp/impacket/blob/master/examples/ntlmrelayx.py
- Impacket - collection of Python classes for working with network protocols.
evil-winrm
-
HackTheBox - Writeup Authority [Retired]
┌──(root㉿kali)-[/home/kali/hackthebox/machines-windows/authority] └─# evil-winrm -i authority.htb -u svc_ldap -p 'lDaP_1n_th3_cle4r!' Evil-WinRM shell v3.4 Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine Data: For more information, check Evil-WinRM Github: https://github.com/Hackplayers/evil-winrm#Remote-path-completion Info: Establishing connection to remote endpoint *Evil-WinRM* PS C:\Users\svc_ldap\Documents>
- Release v3.5 · Evil WinRM - This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it.
-
Active Directory in CTFs
Evil-WinRM exploits WinRM, a protocol used by system administrators on Windows servers.
- GitHub - Hackplayers/evil-winrm: The ultimate WinRM shell for hacking/pentesting
What are some alternatives?
CrackMapExec - A swiss army knife for pentesting networks
rport - remote access and remote management
proxychains - proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP.
DevChecker - Access remote Windows devices for common IT admin tasks and information
Rubeus - Trying to tame the three-headed dog.
LAZYPARIAH - A tool for generating reverse shell payloads on the fly.
impacket - Impacket is a collection of Python classes for working with network protocols. [Moved to: https://github.com/SecureAuthCorp/impacket]
heimdal - Heimdal
ms08_067 - Updating MS08-067 Python exploit script
WhatWeb - Next generation web scanner
Win7Blue - Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits
ruby-pwsh - A ruby gem for interacting with PowerShell