Skip to content

Instantly share code, notes, and snippets.

@nullenc0de
Created December 22, 2025 19:12
Show Gist options
  • Select an option

  • Save nullenc0de/94379729316203a39b1cbc812f1bceb3 to your computer and use it in GitHub Desktop.

Select an option

Save nullenc0de/94379729316203a39b1cbc812f1bceb3 to your computer and use it in GitHub Desktop.
#!/bin/bash
# LinWinPwn Missing Tools Installer
# Installs all tools that linWinPwn checks for but doesn't install by default
# Run with sudo: sudo bash linwinpwn_missing_tools.sh
set -e
scripts_dir="/opt/lwp-scripts"
current_user="${SUDO_USER:-$(whoami)}"
echo "[*] LinWinPwn Missing Tools Installer"
echo "[*] Installing as user: $current_user"
echo ""
echo "[*] Creating directories..."
sudo mkdir -p ${scripts_dir}/ldapper
sudo mkdir -p ${scripts_dir}/Responder
sudo chown -R "$current_user":"$current_user" ${scripts_dir}
cd ${scripts_dir}
echo "[*] Downloading windapsearch..."
wget -q "https://github.com/ropnop/go-windapsearch/releases/latest/download/windapsearch-linux-amd64" -O "$scripts_dir/windapsearch"
echo "[*] Downloading targetedKerberoast..."
wget -q "https://raw.githubusercontent.com/ShutdownRepo/targetedKerberoast/main/targetedKerberoast.py" -O "$scripts_dir/targetedKerberoast.py"
echo "[*] Downloading CVE-2022-33679..."
wget -q "https://raw.githubusercontent.com/Bdenneu/CVE-2022-33679/main/CVE-2022-33679.py" -O "$scripts_dir/CVE-2022-33679.py"
echo "[*] Downloading silenthound..."
wget -q "https://raw.githubusercontent.com/layer8secure/SilentHound/main/silenthound.py" -O "$scripts_dir/silenthound.py"
echo "[*] Downloading FindUncommonShares..."
wget -q "https://raw.githubusercontent.com/p0dalirius/pyFindUncommonShares/refs/heads/main/FindUncommonShares.py" -O "$scripts_dir/FindUncommonShares.py"
echo "[*] Downloading FindUnusualSessions..."
wget -q "https://raw.githubusercontent.com/p0dalirius/FindUnusualSessions/refs/heads/main/FindUnusualSessions.py" -O "$scripts_dir/FindUnusualSessions.py"
echo "[*] Downloading ExtractBitlockerKeys..."
wget -q "https://raw.githubusercontent.com/p0dalirius/ExtractBitlockerKeys/refs/heads/main/python/ExtractBitlockerKeys.py" -O "$scripts_dir/ExtractBitlockerKeys.py"
echo "[*] Downloading ldapconsole..."
wget -q "https://raw.githubusercontent.com/p0dalirius/ldapconsole/master/ldapconsole.py" -O "$scripts_dir/ldapconsole.py"
echo "[*] Downloading pyLDAPmonitor..."
wget -q "https://raw.githubusercontent.com/p0dalirius/LDAPmonitor/master/python/pyLDAPmonitor.py" -O "$scripts_dir/pyLDAPmonitor.py"
echo "[*] Downloading LDAPWordlistHarvester..."
wget -q "https://raw.githubusercontent.com/p0dalirius/pyLDAPWordlistHarvester/refs/heads/main/LDAPWordlistHarvester.py" -O "$scripts_dir/LDAPWordlistHarvester.py"
echo "[*] Downloading aced..."
wget -q "https://github.com/garrettfoster13/aced/archive/refs/heads/main.zip" -O "$scripts_dir/aced.zip"
unzip -o "$scripts_dir/aced.zip" -d "$scripts_dir"
echo "[*] Downloading sccmhunter..."
wget -q "https://github.com/garrettfoster13/sccmhunter/archive/refs/heads/main.zip" -O "$scripts_dir/sccmhunter.zip"
unzip -o "$scripts_dir/sccmhunter.zip" -d "$scripts_dir"
echo "[*] Downloading ldapper..."
wget -q "https://raw.githubusercontent.com/shellster/LDAPPER/master/ldapper.py" -O "$scripts_dir/ldapper/ldapper.py"
wget -q "https://raw.githubusercontent.com/shellster/LDAPPER/master/utilities.py" -O "$scripts_dir/ldapper/utilities.py"
wget -q "https://raw.githubusercontent.com/shellster/LDAPPER/master/queries.py" -O "$scripts_dir/ldapper/queries.py"
wget -q "https://raw.githubusercontent.com/shellster/LDAPPER/master/ldap_connector.py" -O "$scripts_dir/ldapper/ldap_connector.py"
echo "[*] Downloading orpheus..."
wget -q "https://github.com/trustedsec/orpheus/archive/refs/heads/main.zip" -O "$scripts_dir/orpheus.zip"
unzip -o "$scripts_dir/orpheus.zip" -d "$scripts_dir"
echo "[*] Downloading adalanche..."
wget -q "https://github.com/lkarlslund/Adalanche/releases/download/v2025.2.6/adalanche-linux-x64-v2025.2.6" -O "$scripts_dir/adalanche"
echo "[*] Downloading pygpoabuse..."
wget -q "https://github.com/Hackndo/pyGPOAbuse/archive/refs/heads/master.zip" -O "$scripts_dir/pyGPOAbuse.zip"
unzip -o "$scripts_dir/pyGPOAbuse.zip" -d "$scripts_dir"
echo "[*] Downloading GPOwned..."
wget -q "https://raw.githubusercontent.com/X-C3LL/GPOwned/main/GPOwned.py" -O "$scripts_dir/GPOwned.py"
echo "[*] Downloading privexchange..."
wget -q "https://raw.githubusercontent.com/dirkjanm/PrivExchange/master/privexchange.py" -O "$scripts_dir/privexchange.py"
echo "[*] Downloading RunFinger..."
wget -q "https://raw.githubusercontent.com/lgandx/Responder/master/tools/RunFinger.py" -O "$scripts_dir/Responder/RunFinger.py"
wget -q "https://raw.githubusercontent.com/lgandx/Responder/master/tools/odict.py" -O "$scripts_dir/Responder/odict.py"
wget -q "https://raw.githubusercontent.com/lgandx/Responder/master/tools/RunFingerPackets.py" -O "$scripts_dir/Responder/RunFingerPackets.py"
echo "[*] Downloading ldapnomnom..."
wget -q "https://github.com/lkarlslund/ldapnomnom/releases/latest/download/ldapnomnom-linux-x64" -O "$scripts_dir/ldapnomnom"
echo "[*] Downloading godap..."
wget -q "https://github.com/Macmod/godap/releases/download/v2.8.0/godap-v2.8.0-linux-amd64.tar.gz" -O "$scripts_dir/godap-v2.8.0-linux-amd64.tar.gz"
tar -C $scripts_dir -xf "$scripts_dir/godap-v2.8.0-linux-amd64.tar.gz" godap
echo "[*] Downloading SCCMSecrets..."
wget -q "https://github.com/synacktiv/SCCMSecrets/archive/refs/heads/master.zip" -O "$scripts_dir/SCCMSecrets.zip"
unzip -o "$scripts_dir/SCCMSecrets.zip" -d "$scripts_dir"
echo "[*] Downloading GroupPolicyBackdoor..."
wget -q "https://github.com/synacktiv/GroupPolicyBackdoor/archive/refs/heads/master.zip" -O "$scripts_dir/GroupPolicyBackdoor.zip"
unzip -o "$scripts_dir/GroupPolicyBackdoor.zip" -d "$scripts_dir"
echo "[*] Downloading NetworkHound..."
wget -q "https://github.com/MorDavid/NetworkHound/archive/refs/heads/main.zip" -O "$scripts_dir/NetworkHound.zip"
unzip -o "$scripts_dir/NetworkHound.zip" -d "$scripts_dir"
echo "[*] Downloading ScriptScout..."
wget -q "https://raw.githubusercontent.com/MarcoZufferli/ScriptScout/refs/heads/main/scriptscout.py" -O "$scripts_dir/scriptscout.py"
echo "[*] Downloading LDAPNightmare checker..."
wget -q "https://raw.githubusercontent.com/barcrange/CVE-2024-49113-Checker/refs/heads/main/CVE-2024-49113-checker.py" -O "$scripts_dir/CVE-2024-49113-checker.py"
echo "[*] Installing DACLSearch via pipx..."
sudo pipx install "git+https://github.com/cogiceo/daclsearch" 2>/dev/null || echo "[-] DACLSearch pipx install failed, trying alternative..."
# Create symlink if pipx installed to root's local bin
if [ -f "/root/.local/bin/daclsearch" ]; then
sudo ln -sf /root/.local/bin/daclsearch /usr/local/bin/daclsearch
echo "[+] DACLSearch symlinked to /usr/local/bin/daclsearch"
fi
echo "[*] Setting permissions..."
chmod +x "$scripts_dir/windapsearch"
chmod +x "$scripts_dir/targetedKerberoast.py"
chmod +x "$scripts_dir/CVE-2022-33679.py"
chmod +x "$scripts_dir/silenthound.py"
chmod +x "$scripts_dir/FindUncommonShares.py"
chmod +x "$scripts_dir/FindUnusualSessions.py"
chmod +x "$scripts_dir/ExtractBitlockerKeys.py"
chmod +x "$scripts_dir/ldapconsole.py"
chmod +x "$scripts_dir/pyLDAPmonitor.py"
chmod +x "$scripts_dir/LDAPWordlistHarvester.py"
chmod +x "$scripts_dir/aced-main/aced.py"
chmod +x "$scripts_dir/sccmhunter-main/sccmhunter.py"
chmod +x "$scripts_dir/ldapper/ldapper.py"
chmod +x "$scripts_dir/orpheus-main/orpheus.py"
chmod +x "$scripts_dir/adalanche"
chmod +x "$scripts_dir/pyGPOAbuse-master/pygpoabuse.py"
chmod +x "$scripts_dir/GPOwned.py"
chmod +x "$scripts_dir/privexchange.py"
chmod +x "$scripts_dir/Responder/RunFinger.py"
chmod +x "$scripts_dir/ldapnomnom"
chmod +x "$scripts_dir/godap"
chmod +x "$scripts_dir/SCCMSecrets-master/SCCMSecrets.py" 2>/dev/null || true
chmod +x "$scripts_dir/GroupPolicyBackdoor-master/"*.py 2>/dev/null || true
chmod +x "$scripts_dir/NetworkHound-main/"*.py 2>/dev/null || true
chmod +x "$scripts_dir/scriptscout.py"
chmod +x "$scripts_dir/CVE-2024-49113-checker.py"
echo "[*] Cleaning up zip files..."
rm -f "$scripts_dir"/*.zip "$scripts_dir"/*.tar.gz
echo ""
echo "[+] All tools installed successfully!"
echo ""
echo "Tools installed to: $scripts_dir"
echo ""
echo "Installed tools:"
echo " - windapsearch, targetedKerberoast, CVE-2022-33679, silenthound"
echo " - FindUncommonShares, FindUnusualSessions, ExtractBitlockerKeys"
echo " - ldapconsole, pyLDAPmonitor, LDAPWordlistHarvester"
echo " - aced, sccmhunter, ldapper, orpheus, adalanche"
echo " - pygpoabuse, GPOwned, privexchange, RunFinger"
echo " - ldapnomnom, godap, SCCMSecrets, GroupPolicyBackdoor"
echo " - NetworkHound, ScriptScout, LDAPNightmare checker, DACLSearch"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment