Skip to content

g3tsyst3m/undertheradar

Repository files navigation

undertheradar

Simple scripts I tinkered with that afford the pentester AV bypass options for l00ting the stuff you need

PSshell.ps1

Allows the pentester a means of executing commands on the remote machine via Powershell's Invoke-WmiMethod

We take advantage of using SMB file access and simply tail the file that receives our command output using Notepad++.
undertheradar2

Here's how you can enable the Tail -f feature in Notepad++.

  • Click View
  • Select this: image

Dumpy.py

Dumps SAM and SYSTEM files from registry for offline cracking

prompt.py

forces a windows username and password prompt to the victim's desktop and saves results to c:\users\public\creds.log

  • automatically determines the current logged in user's username for you
  • Forces user to continue trying until they get the password right OR they hit the cancel button

image

collecttheloot.py

Just a rough draft of me learning some logon winapi stuff using python.

this script attempts to find passwords in your chrome browser and within your wifi passwords and then tests them to see if any are valid. Does some other stuff too like check group memebership and OS version.
Depends on decryptbrowser.py

simplekeylogger

A very basic, stay under the radar keylogger! keylogger

About

scripts that afford the pentester AV bypass techniques

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy