• XSS.stack #1 – первый литературный журнал от юзеров форума

прочее impacket portable.

Guest

Премиум
Пользователь
Регистрация
31.01.2023
Сообщения
250
Решения
1
Реакции
232
Гарант сделки
1
I chose to recompile the Impacket example scripts to the latest version. Additionally, I compiled them with PyInstaller hooks, as the git repos didn't do so, resulting in complete dysfunction. These versions have been thoroughly tested and work flawlessly.

Download: https://mega.nz/folder/W4Q2VYyJ#SNHO_SOPQ4xjTD7PVJbkhA

File Name SHA-256 Hash
================================================================================
addcomputer.exe e7d0662a892f791bd2dedd49189504ba623ae4fc7cdb10aba3c70ed5d2c44ba5
atexec.exe 3f3db530348018be3effb68c4f85bccacc40577cec59554530e41ac9104712c2
changepasswd.exe b7f82f33d7995ffff297d87af26939df7b3f65121e0c6f13cb2f9646f5cf55a8
dacledit.exe bf5986df9b674902a820a364cee574e839df4d71d51b331b17429433741225b1
dcomexec.exe 7a4e3d85c3b9d1be2d8d6a156f3a4277586a0bddc1ca3f488f8c7004d567e483
describeTicket.exe cb6b9c3bca4a097fe036a7c56b14686de15defa4aa77fef48f44e7001d26d523
dpapi.exe 635c6bb6662ef4855ac7b46c729d0b01fd0a352b55f468b7e351e9cbd6578d69
DumpNTLMInfo.exe e2a8ecaac25a8300bb8873cdc22c7fb8587a0c7f5df19ffe9ba281e43c7a7670
esentutl.exe 1b719d4bf13a23b7da6feb237217b455429b87ce92a0a93dfdcab4b7252ca37b
exchanger.exe 0151b1d6dc660942857469d523a2a45a706b23036d84d0c458b02fb9ec9b9d2c
findDelegation.exe 8df486c4a1f53ec5d79c78c6217c3c4a52165cc4282448cf5c3130f5d7e15219
Get-GPPPassword.exe b262096eabc82394d2c454dff923125d2ab520ec0e3f857d853eb95823bf0cb3
GetADComputers.exe 05f8d0cd21a3145133873a574367ef2cf54604e7cc99af66a858c212bcaca2c1
GetADUsers.exe 9b1b4ae09deafa544f9487c05dc7b355a32f796e7e870d58dfec62c1f147abad
getArch.exe c4a8ee24d64fda5c520abeb084a3b00293ab6db05d6cfb8ba18e35970c61f039
GetLAPSPassword.exe 172310c6c9dd19f93f818757fd09e7a6f9d8aab338c5850945e4961e7b49705d
GetNPUsers.exe 0ec66c27607a96c2368b1ad06bf531065fd2111621a1d7edf12ff96cb070462c
getPac.exe dde09ecbf1000b7bc0555c6da426c224785b6868595154a6a7f8a65b58e2af9a
getST.exe f04fc6f90141f8975d3747faa8f1b83241780d6e993d40b8b79047209da84277
getTGT.exe 4d5809ba4e2d80657a52fd72c973491929422d1f1beda116dcfce66b712b256f
GetUserSPNs.exe 8dd23ad2b8d4ca2b5765b00a3e4c8638d428c8322243ec3abbe0ee40513a37ee
goldenPac.exe c51e55d1b2774dd59a9c36206ba8c6bdcf3ab1fb501bd642b6abf0727b43ae93
karmaSMB.exe 262a69c56bcc5ff65cdd099dcf57bf4176aef31d4f7d87d61cb9bd1a54d64012
keylistattack.exe 05b2253e4a1e614ede72916007686a7a3f7bf9d6772342ef88b004a09c5be98c
kintercept.exe bfe7bbee833554fad9ac45e3de4bd6a174aba49c287c8dddf6b8712c9f9a0368
lookupsid.exe 11a532dbab69e2d293459ade8aa7838b037bc7e3b6d2f20c44c059aba213d90b
machine_role.exe e723a6cbd4ee5aeb3abe438f27066a378fee824e70e1d4027bacd71ff7567a67
mimikatz.exe 45c480279cdc76e571d5852c66dd51c2b72c6bd816ddfc394ef7d1d8fb3da7c2
mqtt_check.exe 97d1528fab2dd296fa4a661b9b7b7040bd3e316952b20a026d652b7a28d14836
mssqlclient.exe cb9198ffbef805208fdaa29f4419274f34431df9ff555b37e788f7c7cde60f26
mssqlinstance.exe ccf41a661aae4ff3265edb0802e1fd3659561835e293d4c24ccb8fb30a13c66d
net.exe c87beea701a7fa8ca09f4943668692399787593d0b6e0ec5210fcbbb6ede5c2a
netview.exe 3f099470cf3ecec65d2b13a9d60af2891470319764fd5f3f3e20f41c1318b8d8
ntfs-read.exe d55cc28ffc571410a2baa811925e44e982e5711166737ffc3d0a9ea033a9e8ac
ntlmrelayx.exe a50df6811466c4c139eec9b0a4ef6cbe06942fbe99afd9363f8a8332e7aa8617
owneredit.exe 2269920debfcb38bacf60236d96040e3c855eb7b2353b74afb10754f02adf59c
ping.exe 8e6ca369b89532addf60ca75264c8b4734ddd399645a09a0e18e57643bdeb4a9
ping6.exe 5a83ce5838f5c5343051387c1225662d12f2745eeef21f1dc4a4c07f8ebbec5e
psexec.exe f04ce3adf756b5c1fe5953370c95383c75f48f8aebb16ad4b837d22f834e40f4
raiseChild.exe 27cb6d58541fa3d3c0543980278c1c9a4d85a842e25916869db87e6d3af31c82
rbcd.exe cab779f13f66ef6145a3adcc1bc4682155bad456c363fc9b944e9f8b778b784a
rdp_check.exe 630d49ef163f34c7815643931fea9d553db7624533874c83802ac0a20ec478e0
reg.exe 3f64f658814fe0f4a8ce4b96c78ade17b08174ebab5bf4c7ec5a0f27fa022693
registry-read.exe d8e8730d120eb274a721c93bf136dd71ec13fb5ccb059a05391dd8e81d79b4d2
rpcdump.exe 526c4878e178585a5da35a71b938b6cb89ad77afb3dbd57ab37c42748a08de59
rpcmap.exe abe4c1d253b77a76547272e7dc757fc6e873a909c4fd1e139dbf70db4a0f5271
sambaPipe.exe c0de999a6a4007f433ac29747e637f26eeb9f9d18feefb1ee9982283c9bc6337
samrdump.exe 6182fb595259e497921c667b253b3a8cea94bd1103a3a0c5f66b91befa68f6b2
secretsdump.exe 3964494f93b6fad1caf28fa322631aea56dfc5138a9a0931cf920da242644814
services.exe 8e3cc5761f11c98fec2c5f8b1e15850343cf9ff7f17ab08e02532f2a574c4c1a
smbclient.exe 354f41536f2041d8b7c45bf7bb0f4f44f7cf1848c71b21487a530c1d18ea91dd
smbexec.exe 2c1e7b61093e6c4cb4ade44b18dee778f2e29135c7f16e117b48dfe219b02a3f
smbserver.exe e53fc99f52949730348af88931df36a0ea065d8dd1a8acc46944a8dc1510edda
sniff.exe 015d81415638f3b8d365d8a9123a83843cf97840cc2f441fb086a9a173b214f6
sniffer.exe ef7d5933065675d47767906769f3399012a8b6b886b34155225cb6383862ea6c
split.exe 5d767be12a9530564b9bc25cf960432566d7e976642e30e5c44edcb593bf7c15
ticketConverter.exe 4137a57031c29bbd2506c84f8adc317798040a50b617d84933dbfa9d36497b52
ticketer.exe e2160a432466b35339ae019c56df8e4079354fc77a5156508fbdfc456d1078f9
tstool.exe c09faf5ba2039106cb5b0b00db4baaa6e81f6745f9365d1222726b7812b0e0a7
wmiexec.exe 9a4e3aea91a474aa9d023f64aaccdd1536403137eaa85519a504b441b12230d1
wmipersist.exe e35d9b2acb92e4cf502aaf2d144142f62e55349079445070872a339b5baf42b2
wmiquery.exe bb82b6665f7b13bdd2472d5769c27982c94533a84cc18e695b1ff76d28704342
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх