Generate GUIDs from job=generate-docs branch=master [skip ci]

This commit is contained in:
Atomic Red Team GUID generator
2022-05-08 02:02:15 +00:00
parent f567ca01a1
commit 3022fe0666
2 changed files with 8 additions and 0 deletions
+4
View File
@@ -121,6 +121,7 @@ atomic_tests:
python #{filename} -i #{host_ip}
name: powershell
- name: WinPwn - spoolvulnscan
auto_generated_guid: 54574908-f1de-4356-9021-8053dd57439a
description: Start MS-RPRN RPC Service Scan using spoolvulnscan function of WinPwn
supported_platforms:
- windows
@@ -131,6 +132,7 @@ atomic_tests:
spoolvulnscan -noninteractive -consoleoutput
name: powershell
- name: WinPwn - MS17-10
auto_generated_guid: 97585b04-5be2-40e9-8c31-82157b8af2d6
description: Search for MS17-10 vulnerable Windows Servers in the domain using powerSQL function of WinPwn
supported_platforms:
- windows
@@ -141,6 +143,7 @@ atomic_tests:
MS17-10 -noninteractive -consoleoutput
name: powershell
- name: WinPwn - bluekeep
auto_generated_guid: 1cca5640-32a9-46e6-b8e0-fabbe2384a73
description: Search for bluekeep vulnerable Windows Systems in the domain using bluekeep function of WinPwn. Can take many minutes to complete (~600 seconds in testing on a small domain).
supported_platforms:
- windows
@@ -151,6 +154,7 @@ atomic_tests:
bluekeep -noninteractive -consoleoutput
name: powershell
- name: WinPwn - fruit
auto_generated_guid: bb037826-cbe8-4a41-93ea-b94059d6bb98
description: Search for potentially vulnerable web apps (low hanging fruits) using fruit function of WinPwn
supported_platforms:
- windows
+4
View File
@@ -999,3 +999,7 @@ eea1d918-825e-47dd-acc2-814d6c58c0e1
7804659b-fdbf-4cf6-b06a-c03e758590e8
3278b2f6-f733-4875-9ef4-bfed34244f0a
dec6a0d8-bcaf-4c22-9d48-2aee59fb692b
54574908-f1de-4356-9021-8053dd57439a
97585b04-5be2-40e9-8c31-82157b8af2d6
1cca5640-32a9-46e6-b8e0-fabbe2384a73
bb037826-cbe8-4a41-93ea-b94059d6bb98