4ndr34z / ntlmthief
☆51Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for ntlmthief
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆54Updated 11 months ago
- PowerShell Reverse Shell☆61Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆78Updated 2 months ago
- Source code and examples for PassiveAggression☆54Updated 5 months ago
- ☆43Updated 4 months ago
- BloodHound PowerShell client☆44Updated last month
- ☆25Updated last year
- Inject RDPThief into memory with PowerShell.☆55Updated last month
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆70Updated this week
- Duplicate not owned Token from Running Process☆72Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆43Updated 3 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Parses Snaffler output file and generate beautified outputs.☆37Updated 3 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 2 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆85Updated last year
- ☆40Updated last year
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated 11 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated last year
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆95Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆80Updated 4 months ago
- A C2 framework built for my bachelors thesis☆53Updated 3 weeks ago
- ☆46Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆86Updated last month
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆89Updated this week
- Automated exploitation of MSSQL servers at scale☆81Updated 2 weeks ago
- Lateral Movement☆119Updated last year
- Enumerate domain machine accounts and perform pre2k password spraying.☆64Updated last year
- My Favorite Offensive Security Scripts☆62Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆30Updated 5 months ago