release/0.1.64 #39
grisuno
announced in
Announcements
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Full Changelog: release/0.1.63...release/0.1.64
getadusers
Executes the GetADUsers.py script to retrieve Active Directory users.
The function retrieves the necessary parameters (domain controller IP and domain) from the
instance's parameter dictionary. If a credentials file exists in the 'sessions_dir',
it reads the file and uses the username/password combinations found there. If the file
does not exist, it prompts the user for a username and password.
The password is copied to the clipboard for convenience. A command is constructed using
the GetADUsers.py tool, and it is then executed to enumerate Active Directory users.
Args:
line (str): The password input from the command line or an empty string if not provided.
Returns:
None
crack_cisco_7_password
Crack a Cisco Type 7 password hash and display the plaintext.
This command takes an encrypted Cisco Type 7 password hash as input,
processes it to recover the original plaintext password, and prints the
result to the console.
Args:
line (str): The encrypted password hash in Cisco Type 7 format.
Returns:
None: The function prints the plaintext password directly to the console.
loxs
Command loxs: Installs and runs Loxs for multi-vulnerability web application scanning.
This function performs the following tasks:
Args:
line (str): Optional argument for specifying the input URL or file, custom payload, and additional options.
Returns:
None
Example:
loxs --url target.com
blazy
Command blazy: Installs and runs blazy for multi-vulnerability web application scanning.
This function performs the following tasks:
Args:
line (str): Optional argument for specifying the input URL.
Returns:
None
Example:
python3 main.py -i target.com
parth
Command parth: Installs and runs Parth for discovering vulnerable URLs and parameters.
This function performs the following tasks:
Args:
line (str): Optional argument for specifying the target domain, import file, or additional Parth options.
Returns:
None
Example:
parth -t example.com
breacher
Command breacher: Installs and runs Breacher for finding admin login pages and EAR vulnerabilities.
This function performs the following tasks:
Args:
line (str): Optional argument for specifying the target URL, file type, and additional Breacher options.
Returns:
None
Example:
breacher -u example.com --type php
xsstrike
Command xsstrike: Installs and runs XSStrike for finding XSS vulnerabilities.
This function performs the following tasks:
Args:
line (str): Optional argument for specifying the target URL, crawling level, encoding, and other XSStrike options.
Returns:
None
Example:
xsstrike -u http://example.com/search.php?q=query --crawl -l 3
This discussion was created from the release release/0.1.64.
Beta Was this translation helpful? Give feedback.
All reactions