mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2025-09-02 10:08:34 +02:00
updates
This commit is contained in:
@ -12,7 +12,7 @@
|
||||
* Compilation:
|
||||
* C:> g++ GlobalProtectDisable.cpp -o GlobalProtectDisable.exe -static -static-libgcc -static-libstdc++
|
||||
*
|
||||
* Mariusz B. / mgeeky, '18-'20
|
||||
* Mariusz Banach / mgeeky, '18-'20
|
||||
**/
|
||||
|
||||
#include "windows.h"
|
||||
|
@ -13,7 +13,7 @@
|
||||
```
|
||||
:: findSymbols.py - Finds PE Import/Exports based on supplied filters.
|
||||
|
||||
Mariusz B. / mgeeky, '21
|
||||
Mariusz Banach / mgeeky, '21
|
||||
<mb [at] binary-offensive.com>
|
||||
|
||||
usage: .\findSymbols.py [options] <path>
|
||||
@ -117,7 +117,7 @@ PS> python3 rdpFileUpload.py -v -f certutil README.md
|
||||
Takes an input file/folder and retypes it into focused RDP session window.
|
||||
That effectively uploads the file into remote host over a RDP channel.
|
||||
|
||||
Mariusz B. / mgeeky '20, (@mariuszbit)
|
||||
Mariusz Banach / mgeeky '20, (@mariuszbit)
|
||||
<mb@binary-offensive.com>
|
||||
|
||||
[+] Will upload file's contents: "README.md"
|
||||
|
@ -9,7 +9,7 @@
|
||||
# - module matching name
|
||||
# - module NOT matching name
|
||||
#
|
||||
# Mariusz B. / mgeeky, '21
|
||||
# Mariusz Banach / mgeeky, '21
|
||||
# <mb [at] binary-offensive.com>
|
||||
#
|
||||
|
||||
@ -436,7 +436,7 @@ def main():
|
||||
out('''
|
||||
:: findSymbols.py - Finds PE Import/Exports based on supplied filters.
|
||||
|
||||
Mariusz B. / mgeeky, '21
|
||||
Mariusz Banach / mgeeky, '21
|
||||
<mb [at] binary-offensive.com>
|
||||
''')
|
||||
|
||||
|
@ -23,7 +23,7 @@
|
||||
# $ ./pth-carpet.py machines.txt pwdump
|
||||
#
|
||||
# coded by:
|
||||
# Mariusz B., 2016 / mgeeky
|
||||
# Mariusz Banach, 2016 / mgeeky
|
||||
# version 0.2
|
||||
#
|
||||
# Should be working on Windows boxes as well as on Linux ones.
|
||||
@ -172,7 +172,7 @@ def worker(stopevent, pwdump, machine):
|
||||
def main():
|
||||
global OPTIONS
|
||||
|
||||
print(colored('\n\tPass-The-Hash Carpet Bombing utility\n\tSmall utility trying every provided hash against every specified machine.\n\tMariusz B., 2016\n', 'white', attrs=['bold']))
|
||||
print(colored('\n\tPass-The-Hash Carpet Bombing utility\n\tSmall utility trying every provided hash against every specified machine.\n\tMariusz Banach, 2016\n', 'white', attrs=['bold']))
|
||||
|
||||
parser = argparse.ArgumentParser(add_help = True, description='Pass-The-Hash mass checking tool')
|
||||
parser.add_argument('rhosts', nargs='?', help='Specifies input file containing list of machines or CIDR notation of hosts')
|
||||
|
@ -21,7 +21,7 @@
|
||||
# - tqdm
|
||||
#
|
||||
# Author:
|
||||
# Mariusz B. / mgeeky (@mariuszbit), '20
|
||||
# Mariusz Banach / mgeeky (@mariuszbit), '20
|
||||
# <mb [at] binary-offensive.com>
|
||||
#
|
||||
|
||||
@ -313,7 +313,7 @@ def parseOptions(argv):
|
||||
Takes an input file/folder and retypes it into focused RDP session window.
|
||||
That effectively uploads the file into remote host over a RDP channel.
|
||||
|
||||
Mariusz B. / mgeeky '20, (@mariuszbit)
|
||||
Mariusz Banach / mgeeky '20, (@mariuszbit)
|
||||
<mb@binary-offensive.com>
|
||||
''')
|
||||
|
||||
|
Reference in New Issue
Block a user