from src.payloads.powershell.prep import prep_powershell_payload #from src.core.payloadgen import create_payloads # Py2/3 compatibility # Python3 renamed raw_input to input try: input = raw_input except NameError: pass # # this is the mssql modules # # define the base path definepath = core.definepath() operating_system = core.check_os() msf_path = core.meta_path() # # this is the brute forcer # def brute(ipaddr, username, port, wordlist): # if ipaddr being passed is invalid if ipaddr == "": return False if ":" in ipaddr: ipaddr = ipaddr.split(":") ipaddr, port = ipaddr
import impacket.tds as tds #from src.core.payloadgen import create_payloads # Py2/3 compatibility # Python3 renamed raw_input to input try: input = raw_input except NameError: pass # # this is the mssql modules # # define the base path definepath = core.definepath() operating_system = core.check_os() msf_path = core.meta_path() # # this is the brute forcer # def brute(ipaddr, username, port, wordlist): # if ipaddr being passed is invalid if ipaddr == "": return False if ":" in ipaddr: ipaddr = ipaddr.split(":") ipaddr, port = ipaddr