Minimalistic Offensive Security Tools

Minimalistic is a simple SMB login attack and password spraying tool.

It takes a list of targets and credentials (username and password) as parameters and it tries to authenticate against each target using the provided credentials.

Despite its minimalistic design, the tool keeps track of everything by writing every result into a text file. This allows the tool to be easily resumed if it was interrupted or skip already compromised targets.

See the main article for detailed description: https://www.infosecmatter.com/minimalistic-smb-login-bruteforcer/

Usage & Examples

Import-Module .\smblogin.ps1

#Usage:
smblogin

#Examples:
smblogin hosts.txt .\Administrator P@ssw0rd
smblogin hosts.txt CORP\bkpadmin P@ssw0rd

Note: The extra mini version lacks check for port tcp/445, otherwise the functionality is the same.

Screenshot

SMB password spraying over the network:

For more information, visit https://www.infosecmatter.com/minimalistic-smb-login-bruteforcer/

Minimalistic AD login bruteforcer (adlogin.ps1)

A simple Active Directory login attack tool.

It takes list of usernames and a password and tries to login with it against specified AD domain using LDAP (directoryservices).

It also retains results in a file in the current working directory, so it can be interrupted and resumed (it will not try to login again if the given user has already been compromised or tried with the given password).

See the main article for detailed description: https://www.infosecmatter.com/minimalistic-ad-login-bruteforcer/

Also Read – Kaiten : A Undetectable Payload Generation

Usage & Examples

Import-Module .\adlogin.ps1

#Usage:
adlogin

#Example:
adlogin users.txt domain.com P@ssw0rd

#Check results (find valid credentials):
gc adlogin.*.txt | sls True

Screenshot

Password login attack against domain users:

For more information, visit https://www.infosecmatter.com/minimalistic-ad-login-bruteforcer/

R K

Recent Posts

Burrow – Breaking Through Firewalls With Open Source Ingenuity

Burrow is an open source tool for burrowing through firewalls, built by teenagers at Hack Club.…

2 days ago

Its-A-Trap : Building Secure Web Applications With A Golang Web Server For Authentication

Simple golang webserver that listens for basic auth or post requests and sends a notification…

2 days ago

Nutek-Apple : Unleashing Power On macOS And Linux

Nutek Security Platform for macOS and Linux operating systems. Tools for hackers, bug hunters and…

2 days ago

SecureSphere Labs – A Haven For Cybersecurity Innovators And Ethical Hackers

Welcome to SecureSphere Labs, your go-to destination for a curated collection of powerful hacking tools…

2 days ago

Vulpes/VulpOS : The Docker-Powered All-in-One Workstation For Penetration Testing And Offsec Labs

All in one Docker-based workstation with hacking tools for Pentesting and offsec Labs by maintained…

2 days ago

LiCo-Extrator : Revolutionizing Icon Extraction Across Platforms

Got it! Below is the updated README.md file with instructions for downloading the project on…

2 days ago