-
## Steps to reproduce
1. Running a PowerShell command on both Windows 7 and Windows 10
## Command string used
crackmapexec smb 192.168.1.25 -u admin -H --exec-method wmiexec -X 'echo PowerSh…
-
**Describe the bug**
Maybe not so much a bug as a desire to see if it would run in WSL. Thinking Windows store apps can be accessed by non-admin users and then install Ubuntu along with lsassy. S…
-
**Environment**
* pip version: 9.0.3
* Python version: 3.6.6
* OS: Fedora 28 x64
**Description**
Hello,
I am currently working on a Python package that pushes entry_points that have the sa…
-
Hello all: I am unable to view data. I tried opening up index.html after configuring Reporting/Results as per the innstructions. Furthermore, I have tried running apache to see if it wasn't a service …
-
EAPHammer should write creds/hashes to a centralized database like the ones used by Empire, crackmapexec, and metasploit. EAPHammer should also pull creds from this centralized database in place of th…
-
## Steps to reproduce
1. On current stable Kali release (3.1.5 Smidge) or Bleeding Edge (4.0.1dev - Bug Pr0n), invoke the -x argument to execute a command, either without specifying the exec method…
-
I have successfully installed the forked Empire and Deathstar on Kali rolling 2017 VM.
Once I generate the powershell code using "launcher powershell DeathStar" and paste same to any of my windows …
-
## Steps to reproduce
The `winrm` mode doesn't like using users/password files. This was used against a [HackTheBox](https://hackthebox.eu) machine, (Heist) and in doing so; cme crashed.
**Note**,…
mez-0 updated
5 years ago
-
## Steps to reproduce
1. install crackmapexec on Arch via AUR: https://aur.archlinux.org/packages/crackmapexec/
2. run crackmapexe on the command line
## Command string used
$ crackmapexec
…
-
Good day,
I have a question about the tool ntlmrelayx.
I'm running it at the office that I working for to do a network investigation.
I created a list of stations that are vulnerable with Crack…