Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/cyberfantics/advanced_window_credential_sniffer
https://github.com/cyberfantics/advanced_window_credential_sniffer
Last synced: about 1 month ago
JSON representation
- Host: GitHub
- URL: https://github.com/cyberfantics/advanced_window_credential_sniffer
- Owner: cyberfantics
- Created: 2024-07-17T14:13:58.000Z (6 months ago)
- Default Branch: main
- Last Pushed: 2024-07-17T14:20:02.000Z (6 months ago)
- Last Synced: 2024-07-17T17:37:31.381Z (6 months ago)
- Language: Python
- Size: 3.91 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Advanced User Account Info
**Developer:** Syed Mansoor ul Hassan Bukhari
**GitHub:** [cyberfantics](https://github.com/cyberfantics)## Overview
`advanced_user_account_info.py` is a Python script designed to retrieve detailed information about user accounts on a Windows machine. It lists user account details, including administrator status, password policies, and more. Additionally, it saves the retrieved information to a text file for easy access and analysis.
## Features
- Lists all user accounts on the device.
- Identifies whether each user account has administrator privileges.
- Displays various account properties such as:
- Disabled status
- Local account status
- Password changeable status
- Password expiration status
- Password requirement status
- Retrieves and displays the current Windows password policy.
- Saves all retrieved information to a text file.## Requirements
- Python 3.x
- `wmi` packageYou can install the required package using pip:
```sh
pip install WMI
```## Usage
```bash
git clone https://github.com/cyberfantics/advanced_window_credential_sniffer.git
cd advanced_window_credential_sniffer
python advanced_user_account_info.py
```
- **The script will generate an output file named user_accounts_details.txt in the same directory, containing all the retrieved information.**## Script Details
The script performs the following main tasks:
1. **Retrieve Administrator Accounts:** Identifies and lists all user accounts with administrator privileges.
2. **List User Accounts:** Gathers detailed information about each user account on the system.
3. **Display Password Policy:** Retrieves and displays the current Windows password policy.
4. **Save to File:** Writes all retrieved information to user_accounts_details.txt.## Contributing
**Contributions are welcome! Please open an issue or submit a pull request on GitHub.**## Contact
[cyberfantics](https://github.com/cyberfantics)
[LinkedIn](https://www.linkedin.com/in/mansoor-bukhari-77549a264/)