Created
December 22, 2025 19:12
-
-
Save nullenc0de/94379729316203a39b1cbc812f1bceb3 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # LinWinPwn Missing Tools Installer | |
| # Installs all tools that linWinPwn checks for but doesn't install by default | |
| # Run with sudo: sudo bash linwinpwn_missing_tools.sh | |
| set -e | |
| scripts_dir="/opt/lwp-scripts" | |
| current_user="${SUDO_USER:-$(whoami)}" | |
| echo "[*] LinWinPwn Missing Tools Installer" | |
| echo "[*] Installing as user: $current_user" | |
| echo "" | |
| echo "[*] Creating directories..." | |
| sudo mkdir -p ${scripts_dir}/ldapper | |
| sudo mkdir -p ${scripts_dir}/Responder | |
| sudo chown -R "$current_user":"$current_user" ${scripts_dir} | |
| cd ${scripts_dir} | |
| echo "[*] Downloading windapsearch..." | |
| wget -q "https://github.com/ropnop/go-windapsearch/releases/latest/download/windapsearch-linux-amd64" -O "$scripts_dir/windapsearch" | |
| echo "[*] Downloading targetedKerberoast..." | |
| wget -q "https://raw.githubusercontent.com/ShutdownRepo/targetedKerberoast/main/targetedKerberoast.py" -O "$scripts_dir/targetedKerberoast.py" | |
| echo "[*] Downloading CVE-2022-33679..." | |
| wget -q "https://raw.githubusercontent.com/Bdenneu/CVE-2022-33679/main/CVE-2022-33679.py" -O "$scripts_dir/CVE-2022-33679.py" | |
| echo "[*] Downloading silenthound..." | |
| wget -q "https://raw.githubusercontent.com/layer8secure/SilentHound/main/silenthound.py" -O "$scripts_dir/silenthound.py" | |
| echo "[*] Downloading FindUncommonShares..." | |
| wget -q "https://raw.githubusercontent.com/p0dalirius/pyFindUncommonShares/refs/heads/main/FindUncommonShares.py" -O "$scripts_dir/FindUncommonShares.py" | |
| echo "[*] Downloading FindUnusualSessions..." | |
| wget -q "https://raw.githubusercontent.com/p0dalirius/FindUnusualSessions/refs/heads/main/FindUnusualSessions.py" -O "$scripts_dir/FindUnusualSessions.py" | |
| echo "[*] Downloading ExtractBitlockerKeys..." | |
| wget -q "https://raw.githubusercontent.com/p0dalirius/ExtractBitlockerKeys/refs/heads/main/python/ExtractBitlockerKeys.py" -O "$scripts_dir/ExtractBitlockerKeys.py" | |
| echo "[*] Downloading ldapconsole..." | |
| wget -q "https://raw.githubusercontent.com/p0dalirius/ldapconsole/master/ldapconsole.py" -O "$scripts_dir/ldapconsole.py" | |
| echo "[*] Downloading pyLDAPmonitor..." | |
| wget -q "https://raw.githubusercontent.com/p0dalirius/LDAPmonitor/master/python/pyLDAPmonitor.py" -O "$scripts_dir/pyLDAPmonitor.py" | |
| echo "[*] Downloading LDAPWordlistHarvester..." | |
| wget -q "https://raw.githubusercontent.com/p0dalirius/pyLDAPWordlistHarvester/refs/heads/main/LDAPWordlistHarvester.py" -O "$scripts_dir/LDAPWordlistHarvester.py" | |
| echo "[*] Downloading aced..." | |
| wget -q "https://github.com/garrettfoster13/aced/archive/refs/heads/main.zip" -O "$scripts_dir/aced.zip" | |
| unzip -o "$scripts_dir/aced.zip" -d "$scripts_dir" | |
| echo "[*] Downloading sccmhunter..." | |
| wget -q "https://github.com/garrettfoster13/sccmhunter/archive/refs/heads/main.zip" -O "$scripts_dir/sccmhunter.zip" | |
| unzip -o "$scripts_dir/sccmhunter.zip" -d "$scripts_dir" | |
| echo "[*] Downloading ldapper..." | |
| wget -q "https://raw.githubusercontent.com/shellster/LDAPPER/master/ldapper.py" -O "$scripts_dir/ldapper/ldapper.py" | |
| wget -q "https://raw.githubusercontent.com/shellster/LDAPPER/master/utilities.py" -O "$scripts_dir/ldapper/utilities.py" | |
| wget -q "https://raw.githubusercontent.com/shellster/LDAPPER/master/queries.py" -O "$scripts_dir/ldapper/queries.py" | |
| wget -q "https://raw.githubusercontent.com/shellster/LDAPPER/master/ldap_connector.py" -O "$scripts_dir/ldapper/ldap_connector.py" | |
| echo "[*] Downloading orpheus..." | |
| wget -q "https://github.com/trustedsec/orpheus/archive/refs/heads/main.zip" -O "$scripts_dir/orpheus.zip" | |
| unzip -o "$scripts_dir/orpheus.zip" -d "$scripts_dir" | |
| echo "[*] Downloading adalanche..." | |
| wget -q "https://github.com/lkarlslund/Adalanche/releases/download/v2025.2.6/adalanche-linux-x64-v2025.2.6" -O "$scripts_dir/adalanche" | |
| echo "[*] Downloading pygpoabuse..." | |
| wget -q "https://github.com/Hackndo/pyGPOAbuse/archive/refs/heads/master.zip" -O "$scripts_dir/pyGPOAbuse.zip" | |
| unzip -o "$scripts_dir/pyGPOAbuse.zip" -d "$scripts_dir" | |
| echo "[*] Downloading GPOwned..." | |
| wget -q "https://raw.githubusercontent.com/X-C3LL/GPOwned/main/GPOwned.py" -O "$scripts_dir/GPOwned.py" | |
| echo "[*] Downloading privexchange..." | |
| wget -q "https://raw.githubusercontent.com/dirkjanm/PrivExchange/master/privexchange.py" -O "$scripts_dir/privexchange.py" | |
| echo "[*] Downloading RunFinger..." | |
| wget -q "https://raw.githubusercontent.com/lgandx/Responder/master/tools/RunFinger.py" -O "$scripts_dir/Responder/RunFinger.py" | |
| wget -q "https://raw.githubusercontent.com/lgandx/Responder/master/tools/odict.py" -O "$scripts_dir/Responder/odict.py" | |
| wget -q "https://raw.githubusercontent.com/lgandx/Responder/master/tools/RunFingerPackets.py" -O "$scripts_dir/Responder/RunFingerPackets.py" | |
| echo "[*] Downloading ldapnomnom..." | |
| wget -q "https://github.com/lkarlslund/ldapnomnom/releases/latest/download/ldapnomnom-linux-x64" -O "$scripts_dir/ldapnomnom" | |
| echo "[*] Downloading godap..." | |
| wget -q "https://github.com/Macmod/godap/releases/download/v2.8.0/godap-v2.8.0-linux-amd64.tar.gz" -O "$scripts_dir/godap-v2.8.0-linux-amd64.tar.gz" | |
| tar -C $scripts_dir -xf "$scripts_dir/godap-v2.8.0-linux-amd64.tar.gz" godap | |
| echo "[*] Downloading SCCMSecrets..." | |
| wget -q "https://github.com/synacktiv/SCCMSecrets/archive/refs/heads/master.zip" -O "$scripts_dir/SCCMSecrets.zip" | |
| unzip -o "$scripts_dir/SCCMSecrets.zip" -d "$scripts_dir" | |
| echo "[*] Downloading GroupPolicyBackdoor..." | |
| wget -q "https://github.com/synacktiv/GroupPolicyBackdoor/archive/refs/heads/master.zip" -O "$scripts_dir/GroupPolicyBackdoor.zip" | |
| unzip -o "$scripts_dir/GroupPolicyBackdoor.zip" -d "$scripts_dir" | |
| echo "[*] Downloading NetworkHound..." | |
| wget -q "https://github.com/MorDavid/NetworkHound/archive/refs/heads/main.zip" -O "$scripts_dir/NetworkHound.zip" | |
| unzip -o "$scripts_dir/NetworkHound.zip" -d "$scripts_dir" | |
| echo "[*] Downloading ScriptScout..." | |
| wget -q "https://raw.githubusercontent.com/MarcoZufferli/ScriptScout/refs/heads/main/scriptscout.py" -O "$scripts_dir/scriptscout.py" | |
| echo "[*] Downloading LDAPNightmare checker..." | |
| wget -q "https://raw.githubusercontent.com/barcrange/CVE-2024-49113-Checker/refs/heads/main/CVE-2024-49113-checker.py" -O "$scripts_dir/CVE-2024-49113-checker.py" | |
| echo "[*] Installing DACLSearch via pipx..." | |
| sudo pipx install "git+https://github.com/cogiceo/daclsearch" 2>/dev/null || echo "[-] DACLSearch pipx install failed, trying alternative..." | |
| # Create symlink if pipx installed to root's local bin | |
| if [ -f "/root/.local/bin/daclsearch" ]; then | |
| sudo ln -sf /root/.local/bin/daclsearch /usr/local/bin/daclsearch | |
| echo "[+] DACLSearch symlinked to /usr/local/bin/daclsearch" | |
| fi | |
| echo "[*] Setting permissions..." | |
| chmod +x "$scripts_dir/windapsearch" | |
| chmod +x "$scripts_dir/targetedKerberoast.py" | |
| chmod +x "$scripts_dir/CVE-2022-33679.py" | |
| chmod +x "$scripts_dir/silenthound.py" | |
| chmod +x "$scripts_dir/FindUncommonShares.py" | |
| chmod +x "$scripts_dir/FindUnusualSessions.py" | |
| chmod +x "$scripts_dir/ExtractBitlockerKeys.py" | |
| chmod +x "$scripts_dir/ldapconsole.py" | |
| chmod +x "$scripts_dir/pyLDAPmonitor.py" | |
| chmod +x "$scripts_dir/LDAPWordlistHarvester.py" | |
| chmod +x "$scripts_dir/aced-main/aced.py" | |
| chmod +x "$scripts_dir/sccmhunter-main/sccmhunter.py" | |
| chmod +x "$scripts_dir/ldapper/ldapper.py" | |
| chmod +x "$scripts_dir/orpheus-main/orpheus.py" | |
| chmod +x "$scripts_dir/adalanche" | |
| chmod +x "$scripts_dir/pyGPOAbuse-master/pygpoabuse.py" | |
| chmod +x "$scripts_dir/GPOwned.py" | |
| chmod +x "$scripts_dir/privexchange.py" | |
| chmod +x "$scripts_dir/Responder/RunFinger.py" | |
| chmod +x "$scripts_dir/ldapnomnom" | |
| chmod +x "$scripts_dir/godap" | |
| chmod +x "$scripts_dir/SCCMSecrets-master/SCCMSecrets.py" 2>/dev/null || true | |
| chmod +x "$scripts_dir/GroupPolicyBackdoor-master/"*.py 2>/dev/null || true | |
| chmod +x "$scripts_dir/NetworkHound-main/"*.py 2>/dev/null || true | |
| chmod +x "$scripts_dir/scriptscout.py" | |
| chmod +x "$scripts_dir/CVE-2024-49113-checker.py" | |
| echo "[*] Cleaning up zip files..." | |
| rm -f "$scripts_dir"/*.zip "$scripts_dir"/*.tar.gz | |
| echo "" | |
| echo "[+] All tools installed successfully!" | |
| echo "" | |
| echo "Tools installed to: $scripts_dir" | |
| echo "" | |
| echo "Installed tools:" | |
| echo " - windapsearch, targetedKerberoast, CVE-2022-33679, silenthound" | |
| echo " - FindUncommonShares, FindUnusualSessions, ExtractBitlockerKeys" | |
| echo " - ldapconsole, pyLDAPmonitor, LDAPWordlistHarvester" | |
| echo " - aced, sccmhunter, ldapper, orpheus, adalanche" | |
| echo " - pygpoabuse, GPOwned, privexchange, RunFinger" | |
| echo " - ldapnomnom, godap, SCCMSecrets, GroupPolicyBackdoor" | |
| echo " - NetworkHound, ScriptScout, LDAPNightmare checker, DACLSearch" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment