You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Dec 6, 2023. It is now read-only.
-u, -p and -H can now accept a comma seperated list of usernames/passwords/hashes or files containing them
Removed the bruteforce options since it's now implicitly handled by -u,-p and -H
Re-implemented the -C (combo file) option for concurrency, additionally the combo file can now accept entries in username:password format
parser.add_argument("-C", metavar="COMBO_FILE", dest='combo_file', type=str, help="Combo file containing a list of domain\\username:password entries" )
2669
-
parser.add_argument("-n", metavar='NAMESPACE', dest='namespace', default='//./root/cimv2', help='Namespace name (default //./root/cimv2)')
2746
+
parser.add_argument("-u", metavar="USERNAME", dest='user', type=str, default=None, help="Username(s) or file containing usernames")
2747
+
parser.add_argument("-p", metavar="PASSWORD", dest='passwd', type=str, default=None, help="Password(s) or file containing passwords")
parser.add_argument("-C", metavar="COMBO_FILE", dest='combo_file', type=str, help="Combo file containing a list of domain\\username:password or username:password entries")
rgroup=parser.add_argument_group("Credential Gathering", "Options for gathering credentials")
2677
2758
rgroup.add_argument("--sam", action='store_true', help='Dump SAM hashes from target systems')
2678
2759
rgroup.add_argument("--mimikatz", action='store_true', help='Run Invoke-Mimikatz on target systems')
2760
+
rgroup.add_argument("--mimikatz-cmd", metavar='MIMIKATZ_CMD', dest='mimi_cmd', help='Run Invoke-Mimikatz with the specified command')
2679
2761
rgroup.add_argument("--ntds", choices={'vss', 'drsuapi', 'ninja'}, help="Dump the NTDS.dit from target DCs using the specifed method\n(drsuapi is the fastest)")
2680
2762
2681
2763
egroup=parser.add_argument_group("Mapping/Enumeration", "Options for Mapping/Enumerating")
@@ -2685,10 +2767,6 @@ def concurrency(hosts):
2685
2767
egroup.add_argument("--lusers", action='store_true', dest='enum_lusers', help='Enumerate logged on users')
2686
2768
egroup.add_argument("--wmi", metavar='QUERY', type=str, dest='wmi_query', help='Issues the specified WMI query')
2687
2769
2688
-
dgroup=parser.add_argument_group("Account Bruteforcing", "Options for bruteforcing SMB accounts")
2689
-
dgroup.add_argument("--bruteforce", nargs=2, metavar=('USER_FILE', 'PASS_FILE'), help="Your wordlists containing Usernames and Passwords")
2690
-
dgroup.add_argument("--exhaust", action='store_true', help="Don't stop on first valid account found")
2691
-
2692
2770
sgroup=parser.add_argument_group("Spidering", "Options for spidering shares")
2693
2771
sgroup.add_argument("--spider", metavar='FOLDER', type=str, default='', help='Folder to spider (defaults to share root dir)')
2694
2772
sgroup.add_argument("--pattern", type=str, default='', help='Pattern to search for in filenames and folders')
@@ -2699,7 +2777,6 @@ def concurrency(hosts):
2699
2777
cgroup.add_argument('--execm', choices={"wmi", "smbexec", "atexec"}, default="smbexec", help="Method to execute the command (default: smbexec)")
2700
2778
cgroup.add_argument("-x", metavar="COMMAND", dest='command', help="Execute the specified command")
2701
2779
cgroup.add_argument("-X", metavar="PS_COMMAND", dest='pscommand', help='Excute the specified powershell command')
2702
-
cgroup.add_argument("-M", metavar='MIMIKATZ_CMD', dest='mimi_cmd', help='Run Invoke-Mimikatz with the specified command')
2703
2780
2704
2781
xgroup=parser.add_argument_group("Shellcode/EXE/DLL injection", "Options for injecting Shellcode/EXE/DLL's in memory using PowerShell")
2705
2782
xgroup.add_argument("--inject", choices={'shellcode', 'exe', 'dll'}, help='Inject Shellcode, EXE or a DLL')
0 commit comments