diff options
| author | 5epi0l <91630053+5epi0l@users.noreply.github.com> | 2025-11-16 06:41:16 +0530 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2025-11-16 06:41:16 +0530 |
| commit | a4f93ec19cba6d900f5d5e4cf1c61ff67ed89e6f (patch) | |
| tree | cb09100e858255e13aebfc866ad93afc95b41808 | |
| parent | 39701131e0bdb8605e2bde6f6ff3c848a634674e (diff) | |
| parent | 2e91655f3e01e6943f2c8d2cb0de5a880a226e4c (diff) | |
Merge pull request #2 from jaytiwari05/main
Added a README
| -rw-r--r-- | FixTime/README.md | 14 | ||||
| -rw-r--r-- | FixTime/fixtime.sh | 1 |
2 files changed, 11 insertions, 4 deletions
diff --git a/FixTime/README.md b/FixTime/README.md index 960febd..394c87d 100644 --- a/FixTime/README.md +++ b/FixTime/README.md @@ -1,3 +1,6 @@ + +--- + # **TimeFix – Kerberos Clock Skew Auto-Fix Toolkit** When attacking Windows domains (WinRM, Kerberos auth, Impacket, Evil-WinRM, etc.), you may hit the classic: @@ -30,13 +33,13 @@ Perfect for pentesters doing Kerberos-based operations where precise time alignm ### **Bash Version** ```bash -sudo ./fixtime <IP> +sudo ./timefix <IP> ``` Example: ```bash -sudo ./fixtime 10.10.10.5 +sudo ./timefix 10.10.10.5 ``` --- @@ -44,13 +47,13 @@ sudo ./fixtime 10.10.10.5 ### **Python Version** ```bash -python3 fixtime.py -u <IP> +python3 timefix.py -u <IP> ``` Example: ```bash -python3 fixtime.py -u http://10.10.10.5 +python3 timefix.py -u 10.10.10.5 ``` --- @@ -62,3 +65,6 @@ These scripts are designed for lab, CTF, and penetration-testing environments wh * Kerberos authentication breaks due to clock skew * NTP is disabled or not configurable * You need a fast, reliable way to sync with the target host + +--- + diff --git a/FixTime/fixtime.sh b/FixTime/fixtime.sh index 35348b0..cd29191 100644 --- a/FixTime/fixtime.sh +++ b/FixTime/fixtime.sh @@ -1,6 +1,7 @@ #!/bin/bash # Author : PaiN05 +# Date: 16/11/25 # --- CONFIGURATION --- WINRM_PORT="5985" |
