release/0.2.16 #63
grisuno
announced in
Announcements
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
What's Changed
Full Changelog: release/0.2.15...release/0.2.16
follina
Executes the MSDT Follina exploit tool to create malicious documents for exploitation.
This function performs the following actions:
Parameters:
line (str): Command argument specifying the action mode.
- If "default", executes with default parameters.
- If "notepad", executes to pop notepad.exe.
- If "reverse", prompts for a port and executes for a reverse shell.
- If neither, displays an error message with usage instructions.
Returns:
None
sawks
Executes the Swaks (Swiss Army Knife for SMTP) tool to send test emails for phishing simulations.
This function performs the following actions:
Parameters:
line (str): Command argument specifying additional options or the message body.
- If not provided, defaults to a basic test message.
Returns:
None
ad_ldap_enum
Executes ad-ldap-enum to enumerate Active Directory objects (users, groups, computers)
through LDAP, collecting extended information on group memberships and additional AD details.
This function enables the enumeration of Active Directory users, groups, and computers
by executing LDAP queries on a specified domain controller. The command constructed allows
password or Pass-the-Hash authentication, supports SSL/TLS, and IPv4/IPv6 connections,
and outputs data into CSV files detailing domain group memberships and extended user/computer
information.
Functionalities include:
ad-ldap-enum.py
to output detailed information in CSV format.The output files are saved in the current working directory with a prepend if specified.
Example command the function can build:
python3 ad-ldap-enum.py -d scrm.local -l 10.10.11.168 -u ksimpson -p ksimpson -v
Usage:
- Run
dp_ad_ldap_enum
to initiate AD object enumeration using ad-ldap-enum.:param line: String containing initial command-line arguments or options.
unzip
Unzips a specified file from the sessions directory.
This function attempts to locate and unzip a file in the sessions directory.
If a filename is provided as
line
, it will use that; otherwise, it will attemptto retrieve a zip file name based on existing zip files in the user's dictionary.
If the zip file is not found or does not exist in the sessions path, it prints
an error message.
Steps of execution:
line
or user dictionary.Usage example:
unzip filename.zip
:param line: The zip filename to be extracted. If empty, a zip file will be selected
automatically if available.
:return: None
regeorg
Executes the reGeorg tool for HTTP(s) tunneling through a SOCKS proxy.
This function performs the following actions:
Parameters:
line (str): Command argument specifying the parameters for the reGeorg execution.
- The expected format is: " ", where is the listening port and is the URL
containing the tunnel script.
Returns:
None
rocky
Reduces a wordlist based on the specified password length.
This function filters the provided wordlist to only include passwords
that match the specified length. If no length is provided, it defaults
to 4. The function constructs a grep command to achieve this and executes
it.
Usage:
do_rocky(line: str)
:param line: The length of the passwords to filter in the wordlist.
This parameter should be a string representing a positive integer.
If not provided, the function prompts the user for input.
:type line: str
:raises ValueError: If the provided length is not a valid positive integer.
Example:
do_rocky('8')
# Executes: grep '^.{8}$' /usr/share/wordlists/rockyou.txt > sessions/lazypass_mini_rocky.txt
This discussion was created from the release release/0.2.16.
Beta Was this translation helpful? Give feedback.
All reactions