Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

RedSiege/rstools

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

88 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

RSTools

Nmap

nmap-open-ports-simple.sh

Get a simple list of IP:Port from Nmap XML. Requires xmlstarlet.

nmap-open-ports-simple.sh nmap-results.xml
192.168.1.1:80
192.168.1.1:443
192.168.1.100:22
192.168.1.200:445

nmap-open-ports-long.sh

Get table delimited table of IP, DNS name, Port, Protocol, Detected Service from Nmap XML. Requires xmlstarlet.

nmap-open-ports-long.sh nmap-results.xml
192.168.1.1 alpha.redsiege.com 22/tcp ssh OpenSSH 7.4protocol 2.0
192.168.1.1 alpha.redsiege.com 443/tcp ssl/http nginx 1.12.2
192.168.1.100 bravo.redsiege.com 22/tcp ssh OpenSSH 7.4protocol 2.0

Web

GetNamesFromServerCert.py

Gets the Common Name and Subject Alternate Names from a certificate.

Takes targets (-t) in IP, FQDN, or CIDR format and combines them with ports (-p) and extracts the CN and the Subject Altrnate Names from the certificate. By default, the script will randomize the host and ports but it can be disabled with -r. The -v option can be used to show the verbose actions.

GetNamesFromServerCert.ps1

Gets the Common Name and Subject Alternate Names from a certificate.

Similar to GetNamesFromServerCert.py but for PowerShell. Parameters are -Targets and -Ports.

Azure

adsso-spray.py

Tool for performing Azure AD user enumeration and password spraying via the Azure AD Seamless SSO endpoint.

usage: adsso-spray.py [-h] [-d DOMAIN] [-l USER_LIST] [-u URL] [-w WAIT] [-p PASSWORD] [-v] [-vv]
                      [-o OUTPUT_FILE]

Enumerate users or password spray against Azure AD Seamless SSO

optional arguments:
  -h, --help            show this help message and exit
  -v, --verbose
  -vv, --more-verbose
  -o OUTPUT_FILE, --output OUTPUT_FILE
                        Output file for results (csv). Default is spray_results.csv

Attack Target:
  -d DOMAIN             Target domain - required
  -l USER_LIST          File with list of target usernames (without domain)
  -u URL, --url URL     Target URL if using something like fireprox; otherwise will directly call
                        the Azure AD SeamlessSSO endpoint
  -w WAIT, --wait WAIT  Number of seconds to sleep between individual user attempts

Password Group:
  -p PASSWORD, --password PASSWORD
                        password to spray. Defaults to "notarealpassword,Iswear".

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •  
Morty Proxy This is a proxified and sanitized view of the page, visit original site.