mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2025-09-02 18:18:34 +02:00
updates
This commit is contained in:
@ -5,7 +5,7 @@ Create Contoso Users in Active Directory This script creates 270 + users in Acti
|
||||
|
||||
***Original Author: Mark Rhodes - markrhodes@gmail.com - @mrhodes***
|
||||
|
||||
***Modified by: Mariusz B., mb@binary-offensive.com - @mgeeky***
|
||||
***Modified by: Mariusz Banach, mb@binary-offensive.com - @mgeeky***
|
||||
|
||||
**To Use:**
|
||||
Extract all files and run Create-ADStructure.ps1 from an Administrative PowerShell prompt.
|
||||
|
@ -3,7 +3,7 @@
|
||||
# with incoming OBEX Object Push requests containing
|
||||
# specified file.
|
||||
#
|
||||
# Mariusz B. / MGeeky, 16'
|
||||
# Mariusz Banach / MGeeky, 16'
|
||||
#
|
||||
# Partially based on `Violent Python` snippets.
|
||||
# Modules required:
|
||||
@ -79,7 +79,7 @@ def main():
|
||||
parser.add_option('-s', '--spam', dest='spam', action='store_true', help='Spam found devices with the file continuosly')
|
||||
|
||||
print '\nBluetooth file carpet bombing via OBEX Object Push'
|
||||
print 'Mariusz B. / MGeeky 16\n'
|
||||
print 'Mariusz Banach / MGeeky 16\n'
|
||||
|
||||
(opts, args) = parser.parse_args()
|
||||
|
||||
|
@ -14,7 +14,7 @@
|
||||
# WILL RETURN:
|
||||
# some-user@example.com,68eacb97d86f0c4621fa2b0e17cabd8c,Test123
|
||||
#
|
||||
# Mariusz B. / mgeeky
|
||||
# Mariusz Banach / mgeeky
|
||||
#
|
||||
|
||||
import sys, os
|
||||
|
@ -4,7 +4,7 @@
|
||||
# In latter case producing encrypted ZIP package that will get decompressed automatically
|
||||
# after decryption.
|
||||
#
|
||||
# Mariusz B., 2016 v0.1
|
||||
# Mariusz Banach, 2016 v0.1
|
||||
#
|
||||
|
||||
require 'optparse'
|
||||
|
@ -11,7 +11,7 @@
|
||||
# - scanning for other VMs
|
||||
# - setting selected VM's IP address within /etc/hosts (and alike) file
|
||||
#
|
||||
# Mariusz B. / mgeeky, '16-'19
|
||||
# Mariusz Banach / mgeeky, '16-'19
|
||||
# v0.7
|
||||
#
|
||||
|
||||
|
@ -3,7 +3,7 @@
|
||||
# Simple XOR brute-force Key recovery script - given a cipher text, plain text and key length
|
||||
# it searches for proper key that could decrypt cipher into text.
|
||||
#
|
||||
# Mariusz B., 2016
|
||||
# Mariusz Banach, 2016
|
||||
#
|
||||
|
||||
import sys
|
||||
|
Reference in New Issue
Block a user