Fist0urs / kerberomView external linksLinks
Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (SPN) within an Active Directory
☆36May 21, 2018Updated 7 years ago
Alternatives and similar repositories for kerberom
Users that are interested in kerberom are comparing it to the libraries listed below
Sorting:
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13May 18, 2018Updated 7 years ago
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year
- ☆37Sep 29, 2020Updated 5 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- ☆50Sep 11, 2019Updated 6 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated last month
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Monitor the textual data pasted into Windows clipboard☆29Nov 4, 2018Updated 7 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 6 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22May 24, 2019Updated 6 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 10 months ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆22Apr 12, 2020Updated 5 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- A bootloader imgdata unpacker for Nexus 4, 5 and 7 smartphones as well as imgdata tool for Nexus 5.☆26Aug 5, 2017Updated 8 years ago
- ☆82Dec 29, 2020Updated 5 years ago
- Blogging system in Modern Perl☆11Jan 3, 2019Updated 7 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- Demo showing Claude Opus does not find CVE-2023-0266☆17Mar 19, 2024Updated last year
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- My ctf-writeups☆12Jan 28, 2019Updated 7 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 6 months ago
- Show the time in Roman Numerals☆11Jan 23, 2020Updated 6 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆35Nov 25, 2025Updated 2 months ago
- Random Hashcat Scrips☆35Oct 12, 2024Updated last year
- Parse greppable Nmap output as a tree☆14Nov 13, 2022Updated 3 years ago
- Python Bindings for Hashtopolis Client API☆18Dec 6, 2023Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Jan 6, 2022Updated 4 years ago