{"id":13475721,"url":"https://github.com/trustedsec/ridenum","last_synced_at":"2025-04-05T16:05:43.036Z","repository":{"id":7337299,"uuid":"8660006","full_name":"trustedsec/ridenum","owner":"trustedsec","description":"Rid_enum is a null session RID cycle attack for brute forcing domain controllers.","archived":false,"fork":false,"pushed_at":"2024-07-28T12:31:06.000Z","size":63,"stargazers_count":269,"open_issues_count":2,"forks_count":85,"subscribers_count":26,"default_branch":"master","last_synced_at":"2025-03-29T15:04:17.579Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/trustedsec.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.txt","contributing":null,"funding":null,"license":"LICENSE.txt","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2013-03-08T21:14:54.000Z","updated_at":"2025-03-26T14:52:50.000Z","dependencies_parsed_at":"2024-10-30T07:52:10.794Z","dependency_job_id":null,"html_url":"https://github.com/trustedsec/ridenum","commit_stats":{"total_commits":65,"total_committers":11,"mean_commits":5.909090909090909,"dds":0.4769230769230769,"last_synced_commit":"9e3b89b513341ac94d956e8c8a79dd37cf461113"},"previous_names":[],"tags_count":2,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/trustedsec%2Fridenum","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/trustedsec%2Fridenum/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/trustedsec%2Fridenum/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/trustedsec%2Fridenum/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/trustedsec","download_url":"https://codeload.github.com/trustedsec/ridenum/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":247361620,"owners_count":20926643,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-07-31T16:01:22.960Z","updated_at":"2025-04-05T16:05:43.003Z","avatar_url":"https://github.com/trustedsec.png","language":"Python","readme":"# RID_ENUM - A simple open source method for performing null session brute forces\n\nCopyright 2018 TrustedSec\n\n+ Written by: David Kennedy (ReL1K)\n+ Twitter: @HackingDave and @TrustedSec\n+ Website: https://www.trustedsec.com\n\n```\n.______       __   _______         _______ .__   __.  __    __  .___  ___.\n|   _  \\     |  | |       \\       |   ____||  \\ |  | |  |  |  | |   \\/   |\n|  |_)  |    |  | |  .--.  |      |  |__   |   \\|  | |  |  |  | |  \\  /  |\n|      /     |  | |  |  |  |      |   __|  |  . `  | |  |  |  | |  |\\/|  |\n|  |\\  \\----.|  | |  '--'  |      |  |____ |  |\\   | |  `--'  | |  |  |  |\n| _| `._____||__| |_______/  _____|_______||__| \\__|  \\______/  |__|  |__|\n                            |______|\n\nWritten by: David Kennedy (ReL1K)\nCompany: https://www.trustedsec.com\nTwitter: @TrustedSec\nTwitter: @HackingDave\n\nRid Enum is a RID cycling attack that attempts to enumerate user accounts through\nnull sessions and the SID to RID enum. If you specify a password file, it will\nautomatically attempt to brute force the user accounts when its finished enumerating.\n\n- RIDENUM is open source and uses all standard python libraries minus python-pexpect. -\n\nYou can also specify an already dumped username file, it needs to be in the DOMAINNAME\\USERNAME\nformat.\n\nExample: ./ridenum.py 192.168.1.50 500 50000 /root/dict.txt /root/user.txt\n\nUsage: ./ridenum.py \u003cserver_ip\u003e \u003cstart_rid\u003e \u003cend_rid\u003e \u003coptional_username\u003e \u003coptional_password\u003e \u003coptional_password_file\u003e \u003coptional_username_filename\u003e\n\n","funding_links":[],"categories":["Uncategorized","Tools","Windows Utilities","Operating Systems"],"sub_categories":["Uncategorized","Web Exploitation Books","Windows Utilities","Windows","Penetration Testing Report Templates"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Ftrustedsec%2Fridenum","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Ftrustedsec%2Fridenum","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Ftrustedsec%2Fridenum/lists"}