Code Monkey home page Code Monkey logo

spraykatz's Introduction


Spraykatz
Spraykatz

Spray love around the world

Index

Title Description
About Brief Description about the tool
Installation Installation and Requirements
Usage How to use Spraykatz
Changelog Spraykatz changelog
Acknowlegments Acknowlegments

About

Spraykatz is a tool without any pretention able to retrieve credentials on Windows machines and large Active Directory environments.

It simply tries to procdump machines and parse dumps remotely in order to avoid detections by antivirus softwares as much as possible.

Installation

This tool is written for python3 to python3.6. Do not use this on production environments!

Ubuntu

On a fresh updated Ubuntu.

apt update
apt install -y python3.6 python3-pip git nmap
git clone https://github.com/aas-n/spraykatz.git
cd spraykatz
pip3 install -r requirements.txt

Using Spraykatz

A quick start could be:

./spraykatz.py -u H4x0r -p L0c4L4dm1n -t 192.168.1.0/24

Spraykatz

Mandatory arguments

Switches Description
-u, --username User to spray with. He must have admin rights on targeted systems in order to gain remote code execution.
-p, --password User's password or NTLM hash in the LM:NT format.
-t, --targets IP addresses and/or IP address ranges. You can submit them via a file of targets (one target per line), or inline (separated by commas).

Optional arguments

Switches Description
-d, --domain User's domain. If he is not member of a domain, simply use -d . instead.
-r, --remove Only try to clean up ProcDump and dumps left behind on distant machines. Just in case.
-v, --verbosity Verbosity mode {warning, info, debug}. Default == info.
-w, --wait How many seconds Spraykatz waits before exiting gracefully. Default is 180 seconds.

Changelog

Version 0.9.9
=============
- Removing impacket submodules (just use pip).

Version 0.9.8
=============
- ProcDump binaries are not embedded anymore. Spraykatz ask for downloading them now.

Version 0.9.7
=============
- adding the "-r" switch to remove procdump & dumps left behind, just in case.
- adding the "-w" switch to specify a timeout before exiting gracefully.
- Debug mode enhanced
- Bugs fixes

Acknowlegments

Spraykatz uses slighlty modified parts of the following projects:

Thanks:

Written by aas

spraykatz's People

Contributors

aas-n avatar cclauss avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

spraykatz's Issues

enhacement

First of all, thank you for this tool!
Secondly, as an enhacement why don't you use masscan instead of nmap and add the option to add on targets file an ip on each line, it would be better for a mass aproach.
thirdly, can be multi procesing as well..for a faster aproach.
i use masscan for taking out ips and it would be much more better to add a list of ips scanned on port 135 before then scanning them with nmap.
a nice touch will be if in creds.txt will be wroted the ip too.

Error when using passwords that starts with $ character

I think their is an error when trying to use the tool with a password that starts with the $ character, as it is showing in the screen shots below, an error message appears at the end stating that Error: argument -p/--password: expected one argument

Screenshot_1
Screenshot_2

parse for kerberos tickets

I had the idea to add to pypkatz funtionality. Prior to an update, there is only logonpassword parsing. I had the idea of adding kerberos ticket key parsing, to save all the kerberos tickets from the dump.
Example scenerio: dumping an unconstrained delegated server that the dc has logged into :)

No module named 'wget'

Hi
spraykatz# ./spraykatz.py -u H4x0r -p L0c4L4dm1n -t 192.168.1.0/24

Traceback (most recent call last):
File "./spraykatz.py", line 11, in
from core.Resources import initSpraykatz
File "/root/ATTACK-1-/spraykatz/core/Resources.py", line 6, in
import wget, zipfile
ModuleNotFoundError: No module named 'wget'

why??

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.