This repository contains small scripts created during penetration tests for various things, that may be useful to other people.
These scripts have generally been written quickly and are unlikely to have proper error handling, or to have been thoroughly tested.
Use at your own risk.
Convert ASP.NET Identity v2 hashes into a format that can be cracked with John. Hashes can be extract with the following SQL query:
SELECT CONCAT(UserName, ':', PasswordHash) FROM AspNetUsers
Takes the output from dbscan
or ldapsearch
and extracts usernames and password hashes into a format that can be used with John, to allow easy password auditing for 389-ds, FreeIPA and Red Hat Identity Manager (IdM). The FreeIPA Password Auditing article on the CODA website contains further details.
Takes the output of NtdsAudit and parses it into a CSV file that shows which enabled users belong to which privileged groups.
A quick TCP port scanner that lets you specify a range of source ports to scan from.
Useful for identifying firewall rules that allow traffic from specific ports (such as 53 or 179).
The lists of source and target ports are defined inside the script in the __main__
function.