Nullinux is an internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB.
If no username and password are provided in the command line arguments, an anonymous login, or null session, is attempted.
Nullinux acts as a wrapper around the Samba tools smbclient & rpcclient to enumerate hosts using a variety of techniques.
For more information, and example output, visit the wiki page.
git clone https://github.com/m8sec/nullinux
cd nullinux
sudo bash setup.sh
positional arguments:
target Target server
optional arguments:
-h, --help show this help message and exit
-v Verbose output
-o OUTPUT_FILE Output users to the specified file
Authentication:
-u USERNAME, -U USERNAME Username
-p PASSWORD, -P PASSWORD Password
Enumeration:
-shares Enumerate shares only
-users Enumerate users only
-q, -quick Fast user enumeration
-r, -rid Perform RID cycling only
-range RID_RANGE Set Custom RID cycling range (Default: '500-550')
-T MAX_THREADS Max threads for RID cycling (Default: 15)
Prompt injection is a type of security vulnerability that can be exploited to control the…
Firefly is an advanced black-box fuzzer and not just a standard asset discovery tool. Firefly…
Winit is a robust, cross-platform library designed for creating and managing windows in Rust applications.…
In today’s digital age, convenience often comes at the cost of security. One such overlooked…
Terminal GPT (tgpt) offers a seamless way to bring the power of ChatGPT 3.5 directly…
garak checks if an LLM can be made to fail in a way we don't…