Skip to content

g3tsyst3m/undertheradar

Repository files navigation

undertheradar

Simple scripts I tinkered with that afford the pentester AV bypass options for l00ting the stuff you need

PSshell.ps1

Allows the pentester a means of executing commands on the remote machine via Powershell's Invoke-WmiMethod

We take advantage of using SMB file access and simply tail the file that receives our command output using Notepad++.
undertheradar2

Here's how you can enable the Tail -f feature in Notepad++.

  • Click View
  • Select this: image

Dumpy.py

Dumps SAM and SYSTEM files from registry for offline cracking

prompt.py

forces a windows username and password prompt to the victim's desktop and saves results to c:\users\public\creds.log

  • automatically determines the current logged in user's username for you
  • Forces user to continue trying until they get the password right OR they hit the cancel button

image

collecttheloot.py

Just a rough draft of me learning some logon winapi stuff using python.

this script attempts to find passwords in your chrome browser and within your wifi passwords and then tests them to see if any are valid. Does some other stuff too like check group memebership and OS version.
Depends on decryptbrowser.py

simplekeylogger

A very basic, stay under the radar keylogger! keylogger

Releases

No releases published

Packages

No packages published