Mohamed A. Baset
d36f90f26c
Update payload.txt
2019-07-11 19:33:28 -05:00
Mohamed A. Baset
e889c414d5
Update payload.txt
...
Adding the payload header!
2019-07-11 17:58:20 -05:00
Mohamed A. Baset
d387f4e185
Update payload.txt
...
Require tool "impacket"
2019-07-11 17:09:39 -05:00
Mohamed A. Baset
3980bab638
Critical fixes
...
I really missed the BB's original variable "$SWITCH_POSITION" since in my testing BB's payload I'm maintaining it in my code as:
ORIGINAL_SWITCH="/root/udisk/payloads/$SWITCH_POSITION"
Thanks to @catatonicprime for offering the fix for this issue.
2019-06-01 02:22:45 -05:00
Mohamed A. Baset
6ee12332e5
Update userlist.txt
2019-06-01 02:03:17 -05:00
Mohamed A. Baset
0a407d0348
Update userlist.txt
2019-05-30 04:08:46 -05:00
Mohamed A. Baset
0068cfccd5
Update payload.txt
2019-05-30 04:01:38 -05:00
Mohamed A. Baset
072c659943
Update payload.txt
2019-05-30 03:44:12 -05:00
Mohamed A. Baset
92f1be3a52
A little nasty trick!
...
Sometimes the host name is the same as the username so we will add it to the username and the password wordlists automatically to be used during the brute force attack.
2019-05-30 01:43:13 -05:00
Mohamed A. Baset
b3537e7a65
Update payload.txt
2019-05-30 00:55:17 -05:00
Mohamed A. Baset
d9d741e828
Update readme.md
2019-05-30 00:54:11 -05:00
Mohamed A. Baset
0973bf25ec
Create payload.txt
2019-05-30 00:50:08 -05:00
Mohamed A. Baset
fcb15af701
Update readme.md
2019-05-30 00:36:31 -05:00
Mohamed A. Baset
ddffe360a4
Update readme.md
2019-05-30 00:35:55 -05:00
Mohamed A. Baset
bb2c9c5bfd
Create mmcbrute.py
2019-05-30 00:31:56 -05:00
Mohamed A. Baset
4778effde3
Create README.md
2019-05-30 00:31:11 -05:00
Mohamed A. Baset
0ac9056917
Create LICENSE
2019-05-30 00:30:30 -05:00
Mohamed A. Baset
fcac3b6d29
Create userlist.txt
2019-05-30 00:08:51 -05:00
Mohamed A. Baset
031a47b0d2
Create passlist.txt
2019-05-30 00:07:30 -05:00
Mohamed A. Baset
d11515bf59
Create readme.md
2019-05-30 00:05:43 -05:00