Checker corp access right
by John - Wednesday August 7, 2024 at 10:04 AM
#1
1) Active directory dumper - collecting the most detailed information about the network, including 3 types of dumps:
a) minidump:
* list of domain users;
* list of domain administrators;
* list of enterprise administrators;
* list of domain controllers;
* list of domain trusts;
* list of servers, including the host name, name and version of the operating system for each server;
* list of user PCs, including the host name, name and version of the operating system for each server;
* OS statistics: list of computers for each version of the operating system;
b) fulldump: repeats the functionality of minidump, and collects additional data:
* list of groups:
* list of OU (organization units);
* list of subnets;
c) fastdump: collects information about the number of users and computers in the domain, and also determines the groups of which the current user is a member. In addition, it determines the list of IP addresses of domain controllers. By default, fastdump is performed in other modes.
d) share enum: collects a list of shared network resources for each computer, checks for read and write rights. The results are saved in one of the following formats: txt, xlsx, json, yaml

2) VPN checker - checks the validity of the VPN. In case of a successful connection to the VPN and LDAP, collects the necessary information about the network in one of the selected modes: fulldump, minidump, fastdump, share enum.

The product has the ability to work both individually - through a proxy, and in the mass access check mode, when you simply pass the VPN list to the input, and then just wait for the work to complete, while having the ability to perform any actions with the already received scanning results.

2500$ source code
Reply
#2
It seems like OP, combined multiple post exploitation tools into a single tool/product. Would like to see few screenshots and the working of this tool. Do you have any name for your product ?.

GLWS.
Reply
#3
(08-07-2024, 10:24 AM)vulture Wrote: It seems like OP, combined multiple  post exploitation tools into a single tool/product.  Would like to see few screenshots and the working of this tool.  Do you have any name for your product ?.

GLWS.

screenshot for what? how work python?
Reply
#4
(08-08-2024, 02:05 AM)John Wrote:
(08-07-2024, 10:24 AM)vulture Wrote: It seems like OP, combined multiple  post exploitation tools into a single tool/product.  Would like to see few screenshots and the working of this tool.  Do you have any name for your product ?.

GLWS.

screenshot for what? how work python?

On how the tool works.
Reply
#5
(08-08-2024, 05:14 AM)vulture Wrote:
(08-08-2024, 02:05 AM)John Wrote:
(08-07-2024, 10:24 AM)vulture Wrote: It seems like OP, combined multiple  post exploitation tools into a single tool/product.  Would like to see few screenshots and the working of this tool.  Do you have any name for your product ?.

GLWS.

screenshot for what? how work python?

On how the tool works.
escrow and tested
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  SELLING AWS Key Access Cracked 6x LordVoldemort 1 875 11 hours ago
Last Post: LordVoldemort
  SELLING FTP Access Cracked 64x Server LordVoldemort 1 611 11 hours ago
Last Post: LordVoldemort
  SELLING [RUSSIA] Social Media Planner (2GB+DB access) xploitleaks 0 985 Today, 01:10 AM
Last Post: Automation
  DATABASE CLOUD ACCESS - TELEGRAM techfleece 0 999 Today, 01:07 AM
Last Post: Automation
  SELLING Canva EDU Lifetime Access – Upgrade to Your Own Email Ipenda 5 565 Today, 12:22 AM
Last Post: Automation

Forum Jump:


 Users browsing this thread: