If you like this project, consider purchasing licenses of OctoPwn, our full pentesting suite that runs in your browser!
For notifications on new builds/releases and other info, hop on to our Discord
Qt5 based GUI for aardwolf RDP/VNC client
This project, alongside with many other pentester tools runs in the browser with the power of OctoPwn!
Check out the community version at OctoPwn - Live
aardpclient
Basic RDP/VNC client running on top of Qt5. Can copy-paste text, handles keyboard and mouse. As usual the scripts take the target/scredentials in URL format. Below some examples
rdp+kerberos-password://TEST\Administrator:Passw0rd!1@win2016ad.test.corp/?dc=10.10.10.2&proxytype=socks5&proxyhost=127.0.0.1&proxyport=1080
HYBRID
) auth using Kerberos auth + password via socks5
to win2016ad.test.corp
, the domain controller (kerberos service) is at 10.10.10.2
. The socks proxy is on 127.0.0.1:1080
rdp+ntlm-password://TEST\Administrator:Passw0rd!1@10.10.10.103
HYBRID
) auth using NTLM auth + password connecting to RDP server 10.10.10.103
rdp+ntlm-password://TEST\Administrator:<NThash>@10.10.10.103
HYBRID
) auth using Pass-the-Hash (NTLM) auth connecting to RDP server 10.10.10.103
rdp+plain://Administrator:Passw0rd!1@10.10.10.103
10.10.10.103
vnc+plain://Passw0rd!1@10.10.10.103
10.10.10.103
vnc+plain://Passw0rd!1@10.10.10.103
10.10.10.103
vnc+plain://:admin:aaa@10.10.10.103
admin:aa
connecting to RDP server 10.10.10.103
. Note that if the password contains :
char you will have to prepend the password with :
apt install python3-pyqt6
before installing aardwolf
and it will (should) workrdpy
. The decompression code and the QT image magic was really valuable.