GoSecure / burp-ntlm-challenge-decoder
Burp extension to decode NTLM SSP headers and extract domain/host information
☆31Updated 4 years ago
Alternatives and similar repositories for burp-ntlm-challenge-decoder:
Users that are interested in burp-ntlm-challenge-decoder are comparing it to the libraries listed below
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 7 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- ☆17Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆21Updated 4 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Updated 8 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- ☆38Updated 4 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Burp Suite plugin that allow to deserialize Java objects and convert them in an XML format. Unpack also gzip responses. Based on BurpJDSe…☆20Updated last year
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- ☆13Updated 3 years ago
- ☆20Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- Methods of C2☆21Updated 9 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆78Updated 3 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆39Updated 4 years ago
- Executes lateral movement through PowerPoint DCOM objects☆19Updated 7 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆64Updated 7 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆29Updated 7 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago