Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive TTPs.
Just realized that this was never addressed, as far as I know: Instead of launching a new listener to handle shells, a "--listener LISTENER_NAME" argument could be added to allow specifying an already extant listener, which it then goes and checks for agents and Does The Magic on. Would really improve/help workflow to be honest.
Just realized that this was never addressed, as far as I know: Instead of launching a new listener to handle shells, a "--listener LISTENER_NAME" argument could be added to allow specifying an already extant listener, which it then goes and checks for agents and Does The Magic on. Would really improve/help workflow to be honest.