Minimalistic is a simple SMB login attack and password spraying tool.
It takes a list of targets and credentials (username and password) as parameters and it tries to authenticate against each target using the provided credentials.
Despite its minimalistic design, the tool keeps track of everything by writing every result into a text file. This allows the tool to be easily resumed if it was interrupted or skip already compromised targets.
See the main article for detailed description: https://www.infosecmatter.com/minimalistic-smb-login-bruteforcer/
Usage & Examples
Import-Module .\smblogin.ps1
#Usage:
smblogin
#Examples:
smblogin hosts.txt .\Administrator P@ssw0rd
smblogin hosts.txt CORP\bkpadmin P@ssw0rd
Note: The extra mini version lacks check for port tcp/445, otherwise the functionality is the same.
Screenshot
SMB password spraying over the network:
For more information, visit https://www.infosecmatter.com/minimalistic-smb-login-bruteforcer/
Minimalistic AD login bruteforcer (adlogin.ps1)
A simple Active Directory login attack tool.
It takes list of usernames and a password and tries to login with it against specified AD domain using LDAP (directoryservices).
It also retains results in a file in the current working directory, so it can be interrupted and resumed (it will not try to login again if the given user has already been compromised or tried with the given password).
See the main article for detailed description: https://www.infosecmatter.com/minimalistic-ad-login-bruteforcer/
Also Read – Kaiten : A Undetectable Payload Generation
Usage & Examples
Import-Module .\adlogin.ps1
#Usage:
adlogin
#Example:
adlogin users.txt domain.com P@ssw0rd
#Check results (find valid credentials):
gc adlogin.*.txt | sls True
Screenshot
Password login attack against domain users:
For more information, visit https://www.infosecmatter.com/minimalistic-ad-login-bruteforcer/
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…