Skip to content

Commit a20d0ca

Browse files
author
SkelSec
committed
updating readme, discord integ, merged PRs, examples fixed
1 parent e023486 commit a20d0ca

File tree

3 files changed

+27
-20
lines changed

3 files changed

+27
-20
lines changed

.github/workflows/python-windows-exe.yml

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -69,13 +69,18 @@ jobs:
6969
with:
7070
webhook: ${{ secrets.DISCORD_WEBHOOK }}
7171
status: ${{ job.status }}
72-
content: "Hey <@here>! New build happened for project ${{ github.event.repository.name }}!"
73-
title: "build"
74-
description: |
75-
Version ${{ github.event.release.tag_name }}
76-
Click [here](${{ github.event.release.html_url }}) to download!
77-
#image: ${{ secrets.EMBED_IMAGE }}
78-
color: 0x0000ff
72+
content: |
73+
${{ github.event_name == 'push' && format('Hey @here! A new commit was pushed to {0}!', github.repository) || '' }}
74+
${{ github.event_name == 'pull_request' && format('Hey @here! A new pull request has been opened on {0}!', github.repository) || '' }}
75+
${{ github.event_name == 'release' && format('Hey @here! A new release was created for project {0}!', github.event.repository.name) || '' }}
76+
title: |
77+
${{ github.event_name == 'push' && 'Push Notification' || '' }}
78+
${{ github.event_name == 'pull_request' && 'Pull Request Notification' || '' }}
79+
${{ github.event_name == 'release' && 'Release Notification' || '' }}
80+
color: |
81+
${{ github.event_name == 'push' && '0x00ff00' || '' }}
82+
${{ github.event_name == 'pull_request' && '0xff0000' || '' }}
83+
${{ github.event_name == 'release' && '0x0000ff' || '' }}
7984
url: "${{ github.server_url }}/${{ github.repository }}"
8085
username: GitHub Actions
8186
avatar_url: "https://avatars.githubusercontent.com/u/19204702"

README.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,17 @@
22

33
## :triangular_flag_on_post: Sponsors
44

5-
If you like this project, consider sponsoring it on GitHub! [Sponsors](https://github.com/sponsors/skelsec/)
5+
If you like this project, consider purchasing licenses of [OctoPwn](https://octopwn.com/), our full pentesting suite that runs in your browser!
6+
For notifications on new builds/releases and other info, hop on to our [Discord](https://discord.gg/PM8utcNxMS)
67

78
# msldap
89
LDAP library for MS AD
910
![Documentation Status](https://user-images.githubusercontent.com/19204702/81515211-3761e880-9333-11ea-837f-bcbe2a67ee48.gif )
1011

11-
## :triangular_flag_on_post: Sponsors
12+
## :triangular_flag_on_post: Runs in the browser
1213

13-
If you want to sponsor this project, you can do it on GitHub now!
14+
This project, alongside with many other pentester tools runs in the browser with the power of OctoPwn!
15+
Check out the community version at [OctoPwn - Live](https://live.octopwn.com/)
1416

1517
# Documentation
1618
[Awesome documentation here!](https://msldap.readthedocs.io/en/latest/)
@@ -98,9 +100,9 @@ Detailed explanation with examples:
98100
ldap+plain://TEST\\victim:<password>@10.10.10.2 (SASL SIMPLE auth)
99101
ldap+ntlm-password://TEST\\victim:<password>@10.10.10.2
100102
ldap+ntlm-nt://TEST\\victim:<nthash>@10.10.10.2
101-
ldap+kerberos-password://TEST\\victim:<password>@10.10.10.2
102-
ldap+kerberos-rc4://TEST\\victim:<rc4key>@10.10.10.2
103-
ldap+kerberos-aes://TEST\\victim:<aes>@10.10.10.2
103+
ldap+kerberos-password://TEST\\victim:<password>@<hostname>/?dc=10.10.10.2
104+
ldap+kerberos-rc4://TEST\\victim:<rc4key>@<hostname>/?dc=10.10.10.2
105+
ldap+kerberos-aes://TEST\\victim:<aes>@<hostname>/?dc=10.10.10.2
104106
ldap://TEST\\victim:[email protected]/DC=test,DC=corp/
105107
ldap://TEST\\victim:[email protected]/DC=test,DC=corp/?timeout=99&proxytype=socks5&proxyhost=127.0.0.1&proxyport=1080&proxytimeout=44
106108
```

msldap/examples/msldapclient.py

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1686,23 +1686,23 @@ def main():
16861686
Username and password authentication using NTLM over SSL/TLS:
16871687
ldaps+ntlm-password://TEST\\victim:[email protected]
16881688
Username and password authentication using Kerberos over plaintext LDAP:
1689-
ldap+kerberos-password://TEST\\victim:password@10.10.10.2/?dc=10.10.10.2
1689+
ldap+kerberos-password://TEST\\victim:password@<hostname>/?dc=10.10.10.2
16901690
Username and password authentication using Kerberos over SSL/TLS:
1691-
ldaps+kerberos-password://TEST\\victim:password@10.10.10.2/?dc=10.10.10.2
1691+
ldaps+kerberos-password://TEST\\victim:password@<hostname>/?dc=10.10.10.2
16921692
NTLM authentication using the NT hash over plaintext LDAP:
16931693
ldap+ntlm-nt://TEST\\victim:<NThash>@10.10.10.2
16941694
Kerberos authentication using the RC4 key over plaintext LDAP:
1695-
ldap+kerberos-rc4://TEST\\victim:<RC4key>@10.10.10.2/?dc=10.10.10.2
1695+
ldap+kerberos-rc4://TEST\\victim:<RC4key>@<hostname>/?dc=10.10.10.2
16961696
SICILY authentication using the NT hash over plaintext LDAP:
16971697
ldap+sicily-nt://TEST\\victim:<NThash>@10.10.10.2
16981698
Kerberos authentication using AES key over plaintext LDAP:
1699-
ldap+kerberos-aes://TEST\\victim:<AESkey>@10.10.10.2/?dc=10.10.10.2
1699+
ldap+kerberos-aes://TEST\\victim:<AESkey>@<hostname>/?dc=10.10.10.2
17001700
Kerberos authentication using CCACHE file over plaintext LDAP:
1701-
ldap+kerberos-ccache://TEST\\victim:<CCACHEfile>@10.10.10.2/?dc=10.10.10.2
1701+
ldap+kerberos-ccache://TEST\\victim:<CCACHEfile>@<hostname>/?dc=10.10.10.2
17021702
Kerberos authentication using keytab file over plaintext LDAP:
1703-
ldap+kerberos-keytab://TEST\\victim:<KEYTABfile>@10.10.10.2/?dc=10.10.10.2
1703+
ldap+kerberos-keytab://TEST\\victim:<KEYTABfile>@<hostname>/?dc=10.10.10.2
17041704
Kerberos authentication using P12 or PFX file over plaintext LDAP (notice that keyfile password is at the 'password' filed):
1705-
ldap+kerberos-pfx://TEST\\victim:admin@10.10.10.2/?dc=10.10.10.2&keydata=<P12file>
1705+
ldap+kerberos-pfx://TEST\\victim:admin@<hostname>/?dc=10.10.10.2&keydata=<P12file>
17061706
SSL authentication using P12 or PFX file over plaintext LDAP, automatically performs STARTTLS:
17071707
ldap+ssl://10.10.10.2/?sslcert=<P12file>&sslpassword=<P12password>'
17081708
SSL authentication using P12 or PFX file over SSL/TLS LDAP:

0 commit comments

Comments
 (0)