With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
REM Code from https://payload.pl/jak-prosto-wirusy-rozbrajaja-zabezpieczenia-windows-10/ | |
for /f “delims=” %%I in (‘wevtutil el’) do (wevtutil cl “%%I”) | |
wevtutil sl Security /e:false |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
# Download and unpack your chosen OpenCV version., eg. as `/usr/local/src/opencv-3.4.1` | |
# You can use https://github.com/pisecurity/opencv-manager repository as well. | |
# This is important. On Ubuntu 20.04 LTS, it is not enough to install just python-dev. | |
apt-get install python-dev python-numpy python-is-python2 python2.7 python2.7-dev python2.7-minimal | |
# All unrelated build settings were cut off. | |
cd /usr/local/src/opencv-3.4.1/build | |
cmake \ | |
-DENABLE_PRECOMPILED_HEADERS=OFF \ |
#!/bin/bash | |
api_key="u123456-qa9oic80zsll1xi0fhbwso1" | |
if [ "$3" = "" ]; then | |
echo "usage: $0 <check-id> <search-for> <replace-with> [--execute]" | |
exit 0 | |
fi | |
tmp=/tmp/uptimerobot-$1-$$.tmp |
#!/bin/sh | |
if [ ! -f /swapfile ]; then | |
dd if=/dev/zero of=/swapfile bs=1M count=16384 | |
chmod 0600 /swapfile | |
mkswap /swapfile | |
swapon /swapfile | |
if ! grep -q swapfile /etc/fstab; then | |
echo "/swapfile none swap sw 0 0" >>/etc/fstab | |
fi |
echo "Installing Espeo custom monitoring client" | |
yum install -y git | |
git clone https://github.com/serverfarmer/heartbeat-linux /opt/heartbeat | |
/opt/heartbeat/setup.sh | |
echo "http://monitoring.espeo.pl/cgi-bin/heartbeat-local.cgi" >/etc/heartbeat/server.url |
#!/bin/sh | |
# Espeo Software server analysis script | |
# Written by Tomasz Klim | |
# Version 1.2 | |
# | |
# Run this script as root and send us the created TGZ package. | |
WD=`pwd` | |
path=$WD/analysis | |
mkdir -p $path/etc $path/log $path/ls $path/proc |
#!/bin/sh | |
# Written by Tomasz Klim, 2019-07-05 | |
# | |
# This is a simplified, open source version. It relies on $MAILTO variable | |
# defined in /etc/crontab file for all cron tasks. A better approach would | |
# be to send emails in dedicated format, to dedicated list of recipients. | |
# | |
# Add this to /etc/crontab: | |
# * * * * * root /etc/local/docker-logtail.sh |
#!/bin/sh | |
apt install apt-transport-https ca-certificates curl software-properties-common | |
echo "deb [arch=amd64] https://download.docker.com/linux/ubuntu bionic stable" >/etc/apt/sources.list.d/docker.list | |
curl -fsSL https://download.docker.com/linux/ubuntu/gpg |apt-key add - | |
apt update | |
apt install docker-ce python-pip |
#!/bin/sh | |
git clone https://github.com/CISOfy/lynis /opt/lynis | |
cd /opt/lynis && /opt/lynis/lynis audit system --cronjob --quiet |grep -v custom.prf | |
grep warning /var/log/lynis-report.dat |egrep -v "(CONT-8104|KRNL-5830|NETW-2705)" |