4ndr34z / ntlmthiefLinks
☆51Updated last year
Alternatives and similar repositories for ntlmthief
Users that are interested in ntlmthief are comparing it to the libraries listed below
Sorting:
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- ☆44Updated 10 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆75Updated 6 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆80Updated 8 months ago
- Discord C2 Profile for Mythic☆29Updated 3 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆36Updated 4 months ago
- ☆27Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- ☆47Updated 3 years ago
- ☆35Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- ☆52Updated last year
- vulnlab.com reaper writeup☆26Updated last year
- A Moodle Scanner☆42Updated 6 months ago
- ☆27Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 6 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆23Updated 6 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 6 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆30Updated 2 months ago
- Automated exploitation of MSSQL servers at scale☆108Updated last week
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- Scripts that automate portions of pentests.☆50Updated last month
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last month
- Lateral Movement☆125Updated last year