yangyangwithgnu/ruadmin: ruadmin is a logon *Brute Force* tool, for windows privilege escalation, but also system management.
2019-10-03 14:54:33 Author: github.com(查看原文) 阅读量:261 收藏

Join GitHub today

GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.

Sign up

ruadmin is a logon *Brute Force* tool, for windows privilege escalation, but also system management.

C++

捐赠:支付宝 [email protected] ,支付宝二维码(左),微信二维码(右)


二手书:书,我提高开发技能的重要手段之一,随着职业生涯的发展,书籍也在不断增多,对我而言,一本书最多读三遍,再往后,几乎没有什么营养吸收,这部分书对我已基本无用,但对其他人可能仍有价值,所以,为合理利用资源,我决定低价出售这些书,希望达到两个目的:0)用售出的钱购买更多新书(没当过雷锋的朋友 (๑´ڡ`๑));1)你低价购得需要的书(虽然二手)。到 https://github.com/yangyangwithgnu/used_books 看看有无你钟意的。



ruadmin is a logon Brute Force tool, for windows privilege escalation, but also system management. ruadmin has been developed in the hope that it will be useful for penetration tester and everyone else that plans to use it for ethical reasons. plz do not use in any illegal purposes.

there are some command line options:

  • --help: show this summary info of all options.
  • --user: by default ruadmin checks all windows OS users (inclue hidden user like yangyangwithgnu$). this option checks only one user.
  • --base-passwds-file: by default ruadmin load built-in base passwds list (about 40,000 chinese and europe-america and hackers weakness passwds). this option load base passwords from file.
  • --se-keywords-file: ruadmin handle base passwds and social engineering keywords, to generate new passwds dict. this option load social engineering keywords from file. attention, keywords will make passwds dict become verrrrrrry huge, so, you'd better set one or two keywords.
  • --one-quit: by default ruadmin checks all passwords for all users. this option quit after the first passwd found for any user.

happy hacking!

(BTW, u can get the exe in Release/ https://github.com/yangyangwithgnu/ruadmin/tree/master/Release/)

papers:


文章来源: https://github.com/yangyangwithgnu/ruadmin
如有侵权请联系:admin#unsafe.sh