smb
Here are 141 public repositories matching this topic...
K8Cscan大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用,程序采用多线程批量扫描大型内网多个IP段C段主机,目前插件包含: C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆破、Windows/Linux系统密码爆破、存活主机扫描、端口扫描、Web信息探测、操作系统版本探测、Cisco思科设备扫描等,支持调用任意外部程序或脚本,支持Cobalt Strike联动
-
Updated
Dec 25, 2019 - Python
Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB.
-
Updated
Jun 1, 2020 - Python
pysmb is an experimental SMB/CIFS library written in Python. It implements the client-side SMB/CIFS protocol (SMB1 and SMB2) which allows your Python application to access and transfer files to/from SMB/CIFS shared folders like your Windows file sharing and Samba folders.
-
Updated
May 17, 2020 - Python
Network share sniffer and auto-mounter for crawling remote file systems
-
Updated
Dec 4, 2019 - Python
A script to deploy File Server Resource Manager and associated scripts to block infected users
-
Updated
Feb 3, 2020 - PowerShell
<< Enhancement >>
- Nullability
It'd be good to either update to nullable syntax or at least provide comments to model methods/properties. EgTONetBIOSNameServiceEntry->namecan be nil? Can be.length == 0? Both the nullable rule + a comment would be suitable here. - Generics
Equally,@property (nonatomic, readonly) NSArray *downloadTasks;can be more straightforward:
`@property (
For all your network pentesting needs
-
Updated
Jun 9, 2020 - PowerShell
Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.
-
Updated
May 27, 2019 - PowerShell
Azure Storage transfer tool and data movement library
-
Updated
Apr 23, 2020 - Python
Random Level Generator for Super Mario Bros. 1 on the NES
-
Updated
Jun 9, 2020 - C++
REPTILEHAUS' simplified build process of Worawit Wang' (@sleepya_) version of EternalBlue.. The NSA exploit brought to you by the ShadowBrokers for exploiting MS17-010
-
Updated
Jan 7, 2019 - Python
A repository of tools for pentesting of restricted and isolated environments.
-
Updated
Jun 12, 2020 - PowerShell
Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit
-
Updated
Jul 2, 2018 - Python
cifsd kernel server(SMB/CIFS server)
-
Updated
Jun 26, 2020 - C
Code (Mostly from http://sharpcifsstd.dobes.jp/ with a slight modification)
SharpCifs.Config.SetProperty("jcifs.smb.client.lport", "8137");
string invalidIP = "192.168.0.240"; // Make sure there are no machines on your local network with the specific IP
//string to Auth-Object.
Console.WriteLine("SMB1");
var auth1 = new NtlmPasswor
Steps to reproduce
- Got a nextcloud instance from version 11 to 18 with enabled user_external and IMAP. Have a few users with IMAP auth. and userid "username@domain.com".
- Configure nextcloud for using user_external with stripped domain part for more than one domain like here.
- Login with the same user tha
Simple containerized Samba server running on Alpine Linux
-
Updated
Mar 30, 2019 - Dockerfile
cifsd kernel server(SMB/CIFS server)
-
Updated
Jun 24, 2020 - C
Pulled the latest version,
Installed with docker run -d -p 127.0.0.1:9392:9392 --name gvm securecompliance/gvm
Logs show that login was successful, but I keep getting presented with the login page. I cannot manually navigate to any of the deeper URIs.
Here is the tail of the logs:
`Starting Open Scanner Protocol daemon for OpenVAS...
Starting Greenbone Vulnerability Manager...
Creati
shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION
-
Updated
May 19, 2017 - Python
SMB module for OpenVAS Scanner
-
Updated
May 12, 2019 - C
Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.
-
Updated
Nov 22, 2019 - Shell
Improve this page
Add a description, image, and links to the smb topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the smb topic, visit your repo's landing page and select "manage topics."


When we search for cached tickets, we ccall ccache.getCredential() specifying the SPN we want to connect. If there are tickets in the cache, those are returned, but we never check whether or not that ticket returned is for the username we want to authenticate with.
Should that matter? I think so.. At least we s