gopacket

module
v0.0.0-...-7d23d5e Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: May 12, 2026 License: Apache-2.0

README

gopacket

A complete Go implementation of Impacket - 63 tools and 24 library packages for Windows network protocol interaction, Active Directory enumeration, and attack execution. Built as a native Go framework so you can compile once and run anywhere without Python dependencies.

Beta Release - Highly Experimental. gopacket is under active development. Core tools have been tested against Active Directory lab environments, but edge cases and protocol quirks are expected. If something isn't working, please test the same operation with Impacket side-by-side and include both outputs in your bug report. This helps us quickly identify whether it's a gopacket-specific issue or a shared protocol limitation.

Installation

git clone https://github.com/mandiant/gopacket
cd gopacket

# Default: Linux/macOS build + install to /usr/local/bin
./install.sh

# Run with no flags and it prompts you through the choices interactively.
# Or pick a target directly:
./install.sh --target portable   # static Linux binaries in ./dist/portable/
./install.sh --target windows    # Windows .exe cross-compiles in ./dist/windows/
./install.sh --target all        # build every target in one run

# Build without installing (native only)
./install.sh --build-only

# Or build with make
make build

The default (--target native) build needs Go 1.24.13+, GCC, and libpcap development headers (apt install build-essential libpcap-dev on Debian/Ubuntu/Kali, yum install gcc libpcap-devel on RHEL/CentOS, or brew install libpcap on macOS). The portable and windows targets only need the Go toolchain; sniff and split become stubs in those builds because they require libpcap. See Platform Support for the full matrix.

Platform Support

gopacket builds on Linux, macOS, and Windows. The set of working tools and available proxying paths depends on the build flags:

Build Tools available Proxying
Linux / macOS with cgo (default) All 63 proxychains (LD_PRELOAD) and/or -proxy SOCKS5
Linux with CGO_ENABLED=0 61 (sniff, split become stubs) -proxy only (proxychains needs the libc hook)
Windows (GOOS=windows CGO_ENABLED=0) 60 (sniff, split, sniffer stubs) -proxy only (no LD_PRELOAD on Windows)

sniff and split depend on libpcap via cgo; sniffer depends on Unix raw sockets. When a tool can't be built for the target, gopacket substitutes a stub that prints a clear message and exits 1, so go build ./... always succeeds and the install layout is consistent across platforms.

To uninstall:

./install.sh --uninstall

Proxy Support

gopacket supports two independent proxying paths. They can also be chained.

proxychains (LD_PRELOAD)

All gopacket tools work through proxychains. Go binaries normally bypass proxychains because Go's runtime handles DNS and networking internally, skipping the LD_PRELOAD hooks that proxychains relies on. gopacket works around this by linking against the system C library for network operations, allowing proxychains to intercept connections normally.

proxychains gopacket-secretsdump 'domain/user:password@target'
proxychains gopacket-smbclient -k -no-pass 'domain/user@dc.domain.local'
Internal SOCKS5 proxy (-proxy)

Every tool accepts -proxy to route outbound TCP through a SOCKS5 server without relying on LD_PRELOAD. Accepted schemes: socks5 and socks5h. When -proxy is unset, the ALL_PROXY / all_proxy environment variables are consulted as a fallback.

gopacket-secretsdump -proxy socks5h://127.0.0.1:1080 'domain/user:password@target'
ALL_PROXY=socks5h://127.0.0.1:1080 gopacket-smbclient 'domain/user:password@target'

UDP-dependent features are disabled under -proxy rather than silently leaking packets (SOCKS5 UDP ASSOCIATE is rarely supported by proxies, and bypassing the proxy for UDP would reveal the operator's real source IP). Affected features and their workarounds are documented in KNOWN_ISSUES.md.

Chaining: -proxy is compatible with proxychains. The TCP connection to the SOCKS5 proxy itself still goes through libc connect(), so proxychains → gopacket → -proxy → target works for nested routing scenarios.

Documentation

See the Library Developer Guide for full API documentation, code examples, and architecture overview for building custom tools on top of gopacket's 24 protocol packages.

Tools (63)

Remote Execution
Tool Description
psexec Remote command execution via SMB service creation
smbexec Remote command execution via SMB (stealthier than psexec)
wmiexec Remote command execution via WMI
dcomexec Remote command execution via DCOM
atexec Remote command execution via Task Scheduler
Credential Dumping & DPAPI
Tool Description
secretsdump SAM/LSA/NTDS.dit extraction and DCSync (remote + offline)
dpapi DPAPI backup key extraction
esentutl Offline ESE database parser (NTDS.dit)
registry-read Offline Windows registry hive parser
Kerberos
Tool Description
getTGT Request a TGT with password, hash, or AES key
getST Request a service ticket with S4U2Self/S4U2Proxy
GetUserSPNs Kerberoasting - find and request SPNs
GetNPUsers AS-REP roasting - find accounts without pre-auth
ticketer Golden/silver ticket forging
ticketConverter Convert between ccache and kirbi formats
describeTicket Parse and decrypt Kerberos tickets
getPac Request and parse PAC information
keylistattack KERB-KEY-LIST-REQ attack (RODC)
raiseChild Child-to-parent domain escalation via golden ticket
Active Directory Enumeration
Tool Description
GetADUsers Enumerate domain users via LDAP
GetADComputers Enumerate domain computers via LDAP
GetLAPSPassword Read LAPS passwords via LDAP
findDelegation Find delegation configurations
lookupsid SID brute-forcing via LSARPC
samrdump Enumerate users via SAMR
rpcdump Dump RPC endpoints via epmapper
rpcmap Scan for accessible RPC interfaces
net net user/group/computer enumeration via SAMR/LSARPC
netview Enumerate sessions, shares, and logged-on users
CheckLDAPStatus Check LDAP signing and channel binding requirements
DumpNTLMInfo Dump NTLM authentication info from SMB negotiation
getArch Detect remote OS architecture via RPC
machine_role Detect machine role (DC, server, workstation)
Active Directory Attacks
Tool Description
addcomputer Create/modify/delete machine accounts (SAMR + LDAP)
rbcd Resource-Based Constrained Delegation manipulation
dacledit Read/write DACLs on AD objects
owneredit Read/modify object ownership
samedit SAM account name spoofing (CVE-2021-42278/42287)
badsuccessor BadSuccessor / backup operator escalation
changepasswd Change/reset passwords via SAMR and LDAP
SMB Tools
Tool Description
smbclient Interactive SMB client (shares, ls, get, put, etc.)
smbserver SMB server for file sharing
attrib Query/modify file attributes via SMB
filetime Query/modify file timestamps via SMB
services Remote service management via SVCCTL
reg Remote registry operations via WINREG
Get-GPPPassword Extract Group Policy Preferences passwords from SYSVOL
karmaSMB Rogue SMB server for hash capture
NTLM Relay
Tool Description
ntlmrelayx Full NTLM relay framework with multi-protocol support

ntlmrelayx supports:

  • Capture servers: SMB, HTTP/HTTPS, WCF (ADWS), RAW, RPC, WinRM
  • Relay clients: SMB, LDAP/LDAPS, HTTP/HTTPS, MSSQL, WinRM, RPC
  • Attacks: secretsdump, smbexec, ldapdump, RBCD delegation, ACL abuse, shadow credentials, ADCS ESC8, addcomputer, DNS manipulation, and more
  • Infrastructure: SOCKS5 proxy with protocol-aware plugins, interactive console, REST API, multi-target round-robin, WPAD serving
SQL Server
Tool Description
mssqlclient Interactive MSSQL client with SQL/Windows/Kerberos auth
mssqlinstance MSSQL instance discovery via SQL Browser
WMI
Tool Description
wmiquery Interactive WMI query shell
wmipersist WMI event subscription persistence
Terminal Services
Tool Description
tstool Terminal Services session and process enumeration
Other Protocols
Tool Description
rdp_check RDP authentication check
mqtt_check MQTT authentication check
exchanger Exchange Web Services client
Utilities
Tool Description
ntfs-read Offline NTFS filesystem parser
ping / ping6 ICMP ping
sniff / sniffer Network packet capture
split Split large files

Authentication

All network tools support three authentication methods:

# Password
gopacket-secretsdump 'domain/user:password@target'

# NTLM hash (pass-the-hash)
gopacket-secretsdump -hashes ':nthash' 'domain/user@target'

# Kerberos (pass-the-ticket)
KRB5CCNAME=ticket.ccache gopacket-secretsdump -k -no-pass 'domain/user@target'
Common Flags
Flag Description
-hashes LMHASH:NTHASH NTLM hash authentication (LM hash can be empty)
-k Use Kerberos authentication
-no-pass Don't prompt for password (use with -k or -hashes)
-dc-ip IP IP address of the domain controller
-target-ip IP IP address of the target (when using hostname for Kerberos)
-port PORT Target port (defaults vary by tool)
-proxy URL Route outbound TCP through a SOCKS5 proxy (e.g. socks5h://127.0.0.1:1080). UDP features are disabled.
-debug Enable debug output
Quick Examples
# Dump domain hashes via DCSync
gopacket-secretsdump 'corp.local/admin:Password1@dc01.corp.local'

# Interactive SMB shell
gopacket-smbclient -hashes ':aabbccdd...' 'corp.local/admin@fileserver'

# Kerberoast
gopacket-getuserspns 'corp.local/user:pass@dc01.corp.local'

# Golden ticket
gopacket-ticketer -nthash <krbtgt_hash> -domain-sid S-1-5-21-... -domain corp.local admin

# NTLM relay with SOCKS proxy
sudo gopacket-ntlmrelayx -t smb://target -socks

# LDAP relay for RBCD
sudo gopacket-ntlmrelayx -t ldaps://dc01.corp.local --delegate-access

# Route all outbound traffic through a SOCKS5 proxy
gopacket-secretsdump -proxy socks5h://127.0.0.1:1080 'corp.local/admin:pass@dc01.corp.local'

Library

The pkg/ directory contains 24 reusable protocol packages that can be imported independently.

Package Description
smb SMB2/3 client with NTLM and Kerberos auth
ldap LDAP client with NTLM/Kerberos bind
dcerpc DCE/RPC client + 20 service implementations (DRSUAPI, SAMR, SVCCTL, LSARPC, WINREG, NETLOGON, DCOM, TSCH, EPMAPPER, etc.)
kerberos Kerberos client, ticket forging (golden/silver), S4U2Self/S4U2Proxy
ntlm NTLM authentication protocol
relay NTLM relay framework (servers, clients, attacks, SOCKS)
tds SQL Server TDS protocol
ese Extensible Storage Engine parser
registry Windows registry hive parser
ntfs NTFS filesystem parser
security Security descriptors, ACLs, SIDs
dpapi DPAPI structures
mqtt MQTT protocol client
session Target/credential parsing (domain/user:pass@host)
flags Unified CLI flag framework

Missing Features (vs Impacket)

gopacket aims for full Impacket parity. The following are not yet implemented:

Relay protocol clients:

  • IMAP relay client + attack (requires Exchange/IMAP server)
  • SMTP relay client (requires SMTP server)

Relay attack modules:

  • SCCM policies/DP attacks (requires SCCM infrastructure)

Standalone tools:

  • ifmap.py (DCOM interface mapping)
  • mimikatz.py (limited Mimikatz over RPC)
  • goldenPac.py (MS14-068 - obsolete on patched systems)
  • smbrelayx.py (superseded by ntlmrelayx)
  • kintercept.py (Kerberos interception)

These gaps are low priority - most require niche infrastructure to test or are obsoleted by newer techniques.

Known Limitations

These are protocol-level limitations shared with Impacket, not gopacket bugs:

  • SMB to LDAPS relay fails on patched DCs due to NTLM MIC validation (post-CVE-2019-1040). Use HTTP coercion instead.
  • WinRM relay blocked by EPA (Extended Protection for Authentication) on patched Server 2019+.
  • RPC relay attacks (tschexec, enum-local-admins) require PKT_INTEGRITY which is unavailable in relay sessions.
  • LDAP relay to port 389 fails on DCs requiring LDAP signing. Always relay to LDAPS (port 636).

See KNOWN_ISSUES.md for detailed information on each issue and workarounds.

Reporting Issues & Contributing

This is a beta release. Bugs are expected, and contributions are welcome.

Why we ask you to test with Impacket first

Because gopacket implements the same wire protocols as Impacket, a large fraction of "bugs" turn out to be environmental, not gopacket-specific - patched DCs, LDAP signing requirements, EPA, PKT_INTEGRITY, SMB signing, NTLM MIC validation post-CVE-2019-1040, missing SPNs, time skew, DNS quirks, firewall rules, and so on. Running the same operation with Impacket side by side removes the environment from the equation:

  • If Impacket fails the same way, the issue is almost always environmental and is likely already documented in KNOWN_ISSUES.md. No bug report needed.
  • If Impacket succeeds where gopacket fails, that's a real gopacket bug and exactly what we want to hear about.

This single triage step saves a lot of round-trips, so please don't skip it.

Filing a bug report
  1. Run the same operation with Impacket and note whether it succeeds or fails
  2. Re-run gopacket with -debug and capture the full output
  3. Anonymize anything sensitive before posting. GitHub issues are public. Strip or replace real hostnames, IP addresses, usernames, password hashes, Kerberos tickets, domain names, SIDs, and any output line that could be tied back to a real engagement. Replacing corp.internalexample.local and dc01.corp.internaldc01.example.local is fine - keep the structure of the data, just not the identifying values. If in doubt, redact it.
  4. Open a GitHub issue and include:
    • Both outputs (gopacket and Impacket), as text not screenshots, anonymized
    • The exact command line you ran (anonymized)
    • Target OS, AD functional level, and any relevant hardening (signing, EPA, channel binding, patch level)
    • gopacket version / commit hash
Feature requests

Open a GitHub issue describing the use case and the Impacket equivalent (if any). If the feature is on the "Missing Features" list above, mention which one - it helps us prioritize.

Pull requests

PRs are welcome. Before opening one:

  • Run go build ./..., go vet ./..., gofmt -l ., and go test ./... and make sure they all pass cleanly
  • Match the existing code style in the package you're touching
  • Keep changes focused - separate refactors from feature work
  • For non-trivial changes, open an issue first to discuss the approach

Why This Matters for Defenders

Threat actors are moving away from Python. Compiled Go and Rust tooling (Sliver, BRC4, Geacon, and bespoke loaders) is increasingly replacing Impacket in real-world intrusions. Most defensive tooling and detection logic was built around Impacket's Python-based network behavior, and that coverage is eroding as the attacker ecosystem shifts to compiled languages.

gopacket exists in part to help the security community get ahead of this shift. By providing an open-source, readable Go implementation of the same protocols and techniques, defenders and detection engineers can:

  • Study how Go-based tooling behaves on the wire rather than waiting to encounter it during an incident
  • Understand the protocol-level differences between Go and Python implementations that make existing signatures less effective
  • Run realistic purple team exercises using the same compiled, single-binary tooling that threat actors are adopting, rather than testing exclusively against Python scripts that behave differently at the network layer

The gap between attacker tooling and defender visibility is widest when new tooling stays private. Open-sourcing gopacket narrows that gap.

Notes

  • Kerberos authentication requires a valid ccache file (TGT or service ticket)
  • For Kerberos, use the FQDN hostname - not an IP address
  • If KRB5CCNAME is not set, tools will look for <username>.ccache in the current directory
  • All tools support both proxychains and an internal -proxy SOCKS5 flag (see Proxy Support)
  • This project is for authorized security testing and research purposes only

License

Released under the Apache License 2.0.

gopacket is a clean Go reimplementation of Impacket; see NOTICE for full third-party acknowledgments.

Directories

Path Synopsis
internal
pkg
dcerpc/bkrp
Package bkrp implements the BackupKey Remote Protocol (MS-BKRP) for retrieving domain backup keys used to decrypt DPAPI secrets.
Package bkrp implements the BackupKey Remote Protocol (MS-BKRP) for retrieving domain backup keys used to decrypt DPAPI secrets.
dcerpc/dcom
Package dcom implements the DCOM Remote Protocol (MS-DCOM).
Package dcom implements the DCOM Remote Protocol (MS-DCOM).
dcerpc/dcom/oaut
Package oaut implements OLE Automation interfaces (IDispatch)
Package oaut implements OLE Automation interfaces (IDispatch)
dcerpc/dcom/wmi
Package wmi implements the WMI Remote Protocol (MS-WMI).
Package wmi implements the WMI Remote Protocol (MS-WMI).
dcerpc/gkdi
Package gkdi implements the MS-GKDI (Group Key Distribution Protocol) RPC client.
Package gkdi implements the MS-GKDI (Group Key Distribution Protocol) RPC client.
dcerpc/icpr
Package icpr implements the MS-ICPR (ICertPassage Remote Protocol) interface.
Package icpr implements the MS-ICPR (ICertPassage Remote Protocol) interface.
dpapi
Package dpapi implements DPAPI (Data Protection API) parsing and decryption for Windows secrets including master keys, credentials, and vaults.
Package dpapi implements DPAPI (Data Protection API) parsing and decryption for Windows secrets including master keys, credentials, and vaults.
dpaping
Package dpaping implements DPAPI-NG (Data Protection API - Next Generation) decryption for LAPS v2 encrypted passwords.
Package dpaping implements DPAPI-NG (Data Protection API - Next Generation) decryption for LAPS v2 encrypted passwords.
ese
mapi
Package mapi provides MAPI (Messaging Application Programming Interface) constants and helpers for working with Exchange address book properties.
Package mapi provides MAPI (Messaging Application Programming Interface) constants and helpers for working with Exchange address book properties.
nspi
Package nspi implements MS-NSPI (Name Service Provider Interface) protocol for querying Exchange address books via RPC over HTTP v2.
Package nspi implements MS-NSPI (Name Service Provider Interface) protocol for querying Exchange address books via RPC over HTTP v2.
remcomsvc
Package remcomsvc provides the RemComSvc binary and protocol structures for psexec-style remote command execution via named pipes.
Package remcomsvc provides the RemComSvc binary and protocol structures for psexec-style remote command execution via named pipes.
rpch
Package rpch implements RPC over HTTP v2 transport as per MS-RPCH specification.
Package rpch implements RPC over HTTP v2 transport as per MS-RPCH specification.
smb
tds
third_party/gokrb5
Package gokrb5 provides a Kerberos 5 implementation for Go.
Package gokrb5 provides a Kerberos 5 implementation for Go.
third_party/gokrb5/asn1tools
Package asn1tools provides tools for managing ASN1 marshaled data.
Package asn1tools provides tools for managing ASN1 marshaled data.
third_party/gokrb5/client
Package client provides a client library and methods for Kerberos 5 authentication.
Package client provides a client library and methods for Kerberos 5 authentication.
third_party/gokrb5/config
Package config implements KRB5 client and service configuration as described at https://web.mit.edu/kerberos/krb5-latest/doc/admin/conf_files/krb5_conf.html
Package config implements KRB5 client and service configuration as described at https://web.mit.edu/kerberos/krb5-latest/doc/admin/conf_files/krb5_conf.html
third_party/gokrb5/credentials
Package credentials provides credentials management for Kerberos 5 authentication.
Package credentials provides credentials management for Kerberos 5 authentication.
third_party/gokrb5/crypto
Package crypto implements cryptographic functions for Kerberos 5 implementation.
Package crypto implements cryptographic functions for Kerberos 5 implementation.
third_party/gokrb5/crypto/common
Package common provides encryption methods common across encryption types
Package common provides encryption methods common across encryption types
third_party/gokrb5/crypto/etype
Package etype provides the Kerberos Encryption Type interface
Package etype provides the Kerberos Encryption Type interface
third_party/gokrb5/crypto/rfc3961
Package rfc3961 provides encryption and checksum methods as specified in RFC 3961
Package rfc3961 provides encryption and checksum methods as specified in RFC 3961
third_party/gokrb5/crypto/rfc3962
Package rfc3962 provides encryption and checksum methods as specified in RFC 3962
Package rfc3962 provides encryption and checksum methods as specified in RFC 3962
third_party/gokrb5/crypto/rfc4757
Package rfc4757 provides encryption and checksum methods as specified in RFC 4757
Package rfc4757 provides encryption and checksum methods as specified in RFC 4757
third_party/gokrb5/crypto/rfc8009
Package rfc8009 provides encryption and checksum methods as specified in RFC 8009
Package rfc8009 provides encryption and checksum methods as specified in RFC 8009
third_party/gokrb5/gssapi
Package gssapi implements Generic Security Services Application Program Interface required for SPNEGO kerberos authentication.
Package gssapi implements Generic Security Services Application Program Interface required for SPNEGO kerberos authentication.
third_party/gokrb5/iana
Package iana provides Kerberos 5 assigned numbers.
Package iana provides Kerberos 5 assigned numbers.
third_party/gokrb5/iana/addrtype
Package addrtype provides Address type assigned numbers.
Package addrtype provides Address type assigned numbers.
third_party/gokrb5/iana/adtype
Package adtype provides Authenticator type assigned numbers.
Package adtype provides Authenticator type assigned numbers.
third_party/gokrb5/iana/asnAppTag
Package asnAppTag provides ASN1 application tag numbers.
Package asnAppTag provides ASN1 application tag numbers.
third_party/gokrb5/iana/chksumtype
Package chksumtype provides Kerberos 5 checksum type assigned numbers.
Package chksumtype provides Kerberos 5 checksum type assigned numbers.
third_party/gokrb5/iana/errorcode
Package errorcode provides Kerberos 5 assigned error codes.
Package errorcode provides Kerberos 5 assigned error codes.
third_party/gokrb5/iana/etypeID
Package etypeID provides Kerberos 5 encryption type assigned numbers.
Package etypeID provides Kerberos 5 encryption type assigned numbers.
third_party/gokrb5/iana/flags
Package flags provides Kerberos 5 flag assigned numbers.
Package flags provides Kerberos 5 flag assigned numbers.
third_party/gokrb5/iana/keyusage
Package keyusage provides Kerberos 5 key usage assigned numbers.
Package keyusage provides Kerberos 5 key usage assigned numbers.
third_party/gokrb5/iana/msgtype
Package msgtype provides Kerberos 5 message type assigned numbers.
Package msgtype provides Kerberos 5 message type assigned numbers.
third_party/gokrb5/iana/nametype
Package nametype provides Kerberos 5 principal name type numbers.
Package nametype provides Kerberos 5 principal name type numbers.
third_party/gokrb5/iana/patype
Package patype provides Kerberos 5 pre-authentication type assigned numbers.
Package patype provides Kerberos 5 pre-authentication type assigned numbers.
third_party/gokrb5/iana/trtype
Package trtype provides Transited Encoding Type assigned numbers.
Package trtype provides Transited Encoding Type assigned numbers.
third_party/gokrb5/kadmin
Package kadmin provides Kerberos administration capabilities.
Package kadmin provides Kerberos administration capabilities.
third_party/gokrb5/keytab
Package keytab implements Kerberos keytabs: https://web.mit.edu/kerberos/krb5-devel/doc/formats/keytab_file_format.html.
Package keytab implements Kerberos keytabs: https://web.mit.edu/kerberos/krb5-devel/doc/formats/keytab_file_format.html.
third_party/gokrb5/krberror
Package krberror provides error type and functions for gokrb5.
Package krberror provides error type and functions for gokrb5.
third_party/gokrb5/messages
Package messages implements Kerberos 5 message types and methods.
Package messages implements Kerberos 5 message types and methods.
third_party/gokrb5/pac
Package pac implements Microsoft Privilege Attribute Certificate (PAC) processing.
Package pac implements Microsoft Privilege Attribute Certificate (PAC) processing.
third_party/gokrb5/types
Package types provides Kerberos 5 data types.
Package types provides Kerberos 5 data types.
third_party/smb2
Package smb2 implements the SMB2/3 client in [MS-SMB2].
Package smb2 implements the SMB2/3 client in [MS-SMB2].
tools
CheckLDAPStatus command
DumpNTLMInfo command
Get-GPPPassword command
GetADComputers command
GetADUsers command
GetLAPSPassword command
GetNPUsers command
GetUserSPNs command
addcomputer command
atexec command
attrib command
badsuccessor command
changepasswd command
dacledit command
dcomexec command
describeTicket command
dpapi command
esentutl command
exchanger command
exchanger is a tool for connecting to MS Exchange via RPC over HTTP v2 and querying the NSPI (Name Service Provider Interface) to enumerate address books and extract user information.
exchanger is a tool for connecting to MS Exchange via RPC over HTTP v2 and querying the NSPI (Name Service Provider Interface) to enumerate address books and extract user information.
filetime command
findDelegation command
getArch command
getPac command
getST command
getTGT command
karmaSMB command
keylistattack command
lookupsid command
machine_role command
mqtt_check command
mssqlclient command
mssqlinstance command
net command
netview command
ntfs-read command
ntlmrelayx command
owneredit command
ping command
ping6 command
psexec command
raiseChild command
rbcd command
rdp_check command
reg command
registry-read command
rpcdump command
rpcmap command
samedit command
samrdump command
secretsdump command
services command
smbclient command
smbexec command
smbserver command
sniff command
sniffer command
split command
ticketConverter command
ticketer command
tstool command
wmiexec command
wmipersist command
wmiquery command

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL