mssql-spider
impacket
mssql-spider | impacket | |
---|---|---|
1 | 25 | |
77 | 12,737 | |
- | 1.3% | |
7.2 | 8.2 | |
22 days ago | 7 days ago | |
Python | Python | |
MIT License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
mssql-spider
impacket
- HackTheBox - Writeup Authority [Retired]
- Socket Programming - Spoofing IP Address
-
SMB Signing question
https://github.com/fortra/impacket/blob/master/examples/ntlmrelayx.py. (see the docs at the top of the program)
-
How to create SMB server from python?
The first result on google for "Python SMB server" literally has a working example
- Is there a way to transfer large files from a victim machine to my local Kali machine via the powershell php script method?
- Attn: pen testers.. What is your favorite tool?
- Impacket
-
Does anyone else get this error when trying to run the following command in the attackingkerberos room" sudo python3 GetUserSPNs.py controller.local/Machine1:Password1 -dc-ip (ip_address) - request
Impacket is now in python 3 also. https://github.com/SecureAuthCorp/impacket
-
path to domain admin
Check out impacket's ntlmrelayx: https://github.com/SecureAuthCorp/impacket/blob/master/examples/ntlmrelayx.py
- Impacket - collection of Python classes for working with network protocols.
What are some alternatives?
impacket - Impacket is a collection of Python classes for working with network protocols. [Moved to: https://github.com/SecureAuthCorp/impacket]
CrackMapExec - A swiss army knife for pentesting networks
DefaultCreds-cheat-sheet - One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
proxychains - proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP.
ActiveReign - A Network Enumeration and Attack Toolset for Windows Active Directory Environments.
Rubeus - Trying to tame the three-headed dog.
Reconnoitre - A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Villain - Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
ms08_067 - Updating MS08-067 Python exploit script
Win7Blue - Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits
FreeIPA - Mirror of FreeIPA, an integrated security information management solution