@@ -11,7 +11,7 @@ def proto_args(parser, parents):
1111 dgroup .add_argument ("-d" , metavar = "DOMAIN" , dest = "domain" , type = str , default = None , help = "domain to authenticate to" )
1212 dgroup .add_argument ("--local-auth" , action = "store_true" , help = "authenticate locally to each target" )
1313
14- egroup = ldap_parser .add_argument_group ("Retrevie hash on the remote DC" , "Options to get hashes from Kerberos" )
14+ egroup = ldap_parser .add_argument_group ("Retrieve hash on the remote DC" , "Options to get hashes from Kerberos" )
1515 egroup .add_argument ("--asreproast" , help = "Output AS_REP response to crack with hashcat to file" )
1616 egroup .add_argument ("--kerberoasting" , help = "Output TGS ticket to crack with hashcat to file" )
1717
@@ -26,7 +26,7 @@ def proto_args(parser, parents):
2626 vgroup .add_argument ("--get-sid" , action = "store_true" , help = "Get domain sid" )
2727 vgroup .add_argument ("--active-users" , nargs = "*" , help = "Get Active Domain Users Accounts" )
2828
29- ggroup = ldap_parser .add_argument_group ("Retrevie gmsa on the remote DC" , "Options to play with gmsa" )
29+ ggroup = ldap_parser .add_argument_group ("Retrieve gmsa on the remote DC" , "Options to play with gmsa" )
3030 ggroup .add_argument ("--gmsa" , action = "store_true" , help = "Enumerate GMSA passwords" )
3131 ggroup .add_argument ("--gmsa-convert-id" , help = "Get the secret name of specific gmsa or all gmsa if no gmsa provided" )
3232 ggroup .add_argument ("--gmsa-decrypt-lsa" , help = "Decrypt the gmsa encrypted value from LSA" )
0 commit comments