You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: COMMANDS.md
+28-18Lines changed: 28 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1413,23 +1413,22 @@ To manually run this command, use the following syntax:
1413
1413
Replace `<domain>` with the actual domain name you want to query.
1414
1414
1415
1415
## psexec
1416
-
Copies the `rhost` IP address to the clipboard and updates the prompt with the IP address.
1416
+
Executes the Impacket PSExec tool to attempt remote execution on the specified target.
1417
1417
1418
-
1. Retrieves the `rhost` IP address from the `self.params` parameter.
1419
-
2. Checks if the `rhost` is valid using `check_rhost()`. If invalid, the function returns without making changes.
1420
-
3. If `line` is 'clean', resets the custom prompt to its original state.
1421
-
4. Otherwise, updates the prompt to include the `rhost` IP address in the specified format.
1422
-
5. Copies the `rhost` IP address to the clipboard using `xclip`.
1423
-
6. Prints a message confirming that the IP address has been copied to the clipboard.
1418
+
This function performs the following actions:
1419
+
1. Checks if the provided target host (`rhost`) is valid.
1420
+
2. If the `line`argument is "pass", it searches for credential files with the pattern `credentials*.txt`
1421
+
and allows the user to select which file to use for executing the command.
1422
+
3. If the `line` argument is not "pass", it assumes execution without a password (using the current credentials).
1423
+
4. Copies the `rhost`IP address to the clipboard for ease of use.
1424
1424
1425
-
:param line: This parameter determines whether the prompt should be reset or updated with the IP address.
1426
-
:type line: str
1427
-
:returns: None
1425
+
Parameters:
1426
+
line (str): A command argument to determine the action.
1427
+
If "pass", the function searches for credential files and authenticates using the selected file.
1428
+
Otherwise, it executes PSExec without a password using the `rhost` IP.
1428
1429
1429
-
Manual execution:
1430
-
To manually run this command, use the following syntax:
1431
-
rhost <line>
1432
-
Replace `<line>` with 'clean' to reset the prompt, or any other string to update the prompt with the IP address.
1430
+
Returns:
1431
+
None
1433
1432
1434
1433
## rpcdump
1435
1434
Executes the `rpcdump.py` script to dump RPC services from a target host.
@@ -2201,7 +2200,8 @@ Creates a `credentials.txt` file in the `sessions` directory with the specified
2201
2200
2202
2201
This function performs the following actions:
2203
2202
1. Validates the input line to ensure it contains a colon (`:`), indicating the presence of both a username and password.
2204
-
2. Writes the valid input to `sessions/credentials.txt`.
2203
+
2. Backs up the existing `credentials.txt` file if it exists, renaming it to `credentials_{username}.txt` based on the existing username.
2204
+
3. Writes the valid input to `sessions/credentials.txt`.
2205
2205
2206
2206
Usage:
2207
2207
createcredentials user:password
@@ -5009,12 +5009,13 @@ Executes the Evil-WinRM tool to attempt authentication against the specified tar
5009
5009
5010
5010
This function performs the following actions:
5011
5011
1. Checks if the provided target host (`rhost`) is valid.
5012
-
2. If the `line` argument is "pass", it reads credentials from the `credentials.txt` file and attempts authentication for each user-password pair using Evil-WinRM.
5012
+
2. If the `line` argument is "pass", it searches for credential files with the pattern `credentials*.txt`
5013
+
and allows the user to select which file to use for executing the command.
5013
5014
3. If `line` is not "pass", it prints an error message indicating the correct usage.
5014
5015
5015
5016
Parameters:
5016
-
line (str): A command argument to determine the action.
5017
-
If "pass", the function reads credentials from the `credentials.txt` file and attempts to authenticate.
5017
+
line (str): A command argument to determine the action.
5018
+
If "pass", the function searches for credential files and authenticates using the selected file.
5018
5019
If not "pass", it prints an error message with usage instructions.
5019
5020
5020
5021
Returns:
@@ -5594,6 +5595,15 @@ This function performs the following tasks:
5594
5595
:type line: str
5595
5596
:returns: None
5596
5597
5598
+
## cve
5599
+
Search for a CVE using the CIRCL API.
5600
+
5601
+
This function sends a GET request to the CIRCL API to retrieve CVE details
5602
+
and prints relevant information to the screen.
5603
+
5604
+
:param line: A string containing the CVE ID (optional).
5605
+
:returns: None
5606
+
5597
5607
## find_tgts
5598
5608
Finds and returns a list of target hosts with port 445 open in the specified subnet.
Copy file name to clipboardExpand all lines: README.md
+48-18Lines changed: 48 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1274,6 +1274,19 @@ and stderr) in a variable. If interrupted, the process is terminated gracefully.
1274
1274
Example:
1275
1275
To execute a command, call `run_command("ls -l")`.
1276
1276
1277
+
## generate_random_cve_id
1278
+
No description available.
1279
+
1280
+
## get_credentials
1281
+
Searches for credential files with the pattern 'credentials*.txt' and allows the user to selectone.
1282
+
1283
+
The functionlists all matching files and prompts the user to selectone. It then reads the selected file
1284
+
and returns a list of tuples with the format (username, password) foreach linein the file.
1285
+
1286
+
Returns:
1287
+
list of tuples: A list containing tuples with (username, password) foreach credential foundin the file.
1288
+
If no files are found or an invalid selection is made, an empty list is returned.
1289
+
1277
1290
## wrapper
1278
1291
internal wrapper of internal functionto implement multiples rhost to operate.
1279
1292
@@ -2695,23 +2708,22 @@ To manually run this command, use the following syntax:
2695
2708
Replace `<domain>` with the actual domain name you want to query.
2696
2709
2697
2710
## psexec
2698
-
Copies the `rhost` IP address to the clipboard and updates the prompt with the IP address.
2711
+
Executes the Impacket PSExec tool to attempt remote execution on the specified target.
2699
2712
2700
-
1. Retrieves the `rhost` IP address from the `self.params` parameter.
2701
-
2. Checks if the `rhost` is valid using `check_rhost()`. If invalid, the function returns without making changes.
2702
-
3. If `line` is 'clean', resets the custom prompt to its original state.
2703
-
4. Otherwise, updates the prompt to include the `rhost` IP address in the specified format.
2704
-
5. Copies the `rhost` IP address to the clipboard using `xclip`.
2705
-
6. Prints a message confirming that the IP address has been copied to the clipboard.
2713
+
This function performs the following actions:
2714
+
1. Checks if the provided target host (`rhost`) is valid.
2715
+
2. If the `line` argument is "pass", it searches for credential files with the pattern `credentials*.txt`
2716
+
and allows the user to select which file to use for executing the command.
2717
+
3. If the `line` argument is not "pass", it assumes execution without a password (using the current credentials).
2718
+
4. Copies the `rhost` IP address to the clipboard for ease of use.
2706
2719
2707
-
:param line: This parameter determines whether the prompt should be reset or updated with the IP address.
2708
-
:type line: str
2709
-
:returns: None
2720
+
Parameters:
2721
+
line (str): A command argument to determine the action.
2722
+
If "pass", the function searches for credential files and authenticates using the selected file.
2723
+
Otherwise, it executes PSExec without a password using the `rhost` IP.
2710
2724
2711
-
Manual execution:
2712
-
To manually run this command, use the following syntax:
2713
-
rhost <line>
2714
-
Replace `<line>` with 'clean' to reset the prompt, or any other string to update the prompt with the IP address.
2725
+
Returns:
2726
+
None
2715
2727
2716
2728
## rpcdump
2717
2729
Executes the `rpcdump.py` script to dump RPC services from a target host.
@@ -3483,7 +3495,8 @@ Creates a `credentials.txt` file in the `sessions` directory with the specified
3483
3495
3484
3496
This function performs the following actions:
3485
3497
1. Validates the input line to ensure it contains a colon (`:`), indicating the presence of both a username and password.
3486
-
2. Writes the valid input to `sessions/credentials.txt`.
3498
+
2. Backs up the existing `credentials.txt` file if it exists, renaming it to `credentials_{username}.txt` based on the existing username.
3499
+
3. Writes the valid input to `sessions/credentials.txt`.
3487
3500
3488
3501
Usage:
3489
3502
createcredentials user:password
@@ -6291,12 +6304,13 @@ Executes the Evil-WinRM tool to attempt authentication against the specified tar
6291
6304
6292
6305
This function performs the following actions:
6293
6306
1. Checks if the provided target host (`rhost`) is valid.
6294
-
2. If the `line` argument is "pass", it reads credentials from the `credentials.txt` file and attempts authentication for each user-password pair using Evil-WinRM.
6307
+
2. If the `line` argument is "pass", it searches for credential files with the pattern `credentials*.txt`
6308
+
and allows the user to select which file to use for executing the command.
6295
6309
3. If `line` is not "pass", it prints an error message indicating the correct usage.
6296
6310
6297
6311
Parameters:
6298
-
line (str): A command argument to determine the action.
6299
-
If "pass", the function reads credentials from the `credentials.txt` file and attempts to authenticate.
6312
+
line (str): A command argument to determine the action.
6313
+
If "pass", the function searches for credential files and authenticates using the selected file.
6300
6314
If not "pass", it prints an error message with usage instructions.
6301
6315
6302
6316
Returns:
@@ -6876,6 +6890,15 @@ This function performs the following tasks:
6876
6890
:type line: str
6877
6891
:returns: None
6878
6892
6893
+
## cve
6894
+
Search for a CVE using the CIRCL API.
6895
+
6896
+
This function sends a GET request to the CIRCL API to retrieve CVE details
6897
+
and prints relevant information to the screen.
6898
+
6899
+
:param line: A string containing the CVE ID (optional).
6900
+
:returns: None
6901
+
6879
6902
## find_tgts
6880
6903
Finds and returns a list of target hosts with port 445 open in the specified subnet.
6881
6904
@@ -7095,6 +7118,13 @@ Helper function to alternate the case of characters in a string.
7095
7118
# Changelog
7096
7119
7097
7120
7121
+
### Nuevas características
7122
+
7123
+
### Otros
7124
+
7125
+
* * feat(feat): eternalblue \n\n Version: release/0.1.52 \n\n and scanner in pwntomate tool alias pyautomate coomand \n\n Modified file(s):\n- COMMANDS.md - README.md - docs/COMMANDS.html - docs/README.html - docs/index.html - docs/index.html.bak\n LazyOwn on HackTheBox: https://app.hackthebox.com/teams/overview/6429 \n\n LazyOwn/ https://grisuno.github.io/LazyOwn/ \n\n \n\n Fecha: Tue Oct 1 01:42:32 2024 -0300 \n\n Hora: 1727757752
0 commit comments