JacksonVD / PwnedPasswordsNTLMLinks
Quick binary search for NTLM hash dataset
☆17Updated 6 years ago
Alternatives and similar repositories for PwnedPasswordsNTLM
Users that are interested in PwnedPasswordsNTLM are comparing it to the libraries listed below
Sorting:
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Updated 6 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 6 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Updated 5 years ago
- Get all AD objects which are hidden from you☆18Updated 7 years ago
- Presentation Slides☆27Updated 6 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆67Updated 6 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- BloodHound Data Scanner☆45Updated 4 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Updated 8 years ago
- Builds a hashmap of AD NTLM hashes/usernames and iterates through a second list of hashes checking for the existence of each entry in the…☆77Updated 4 years ago
- This script runs several security checks and makes modifications (with your permission) to your Active Directory domain to improve it's s…☆45Updated 9 years ago
- A tool to evaluate the password health of Active Directory accounts.☆43Updated 7 months ago
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Updated 2 months ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Updated 5 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Updated 8 years ago
- Set of ultra technical notes about AD☆18Updated 7 years ago
- gpocheck☆30Updated 10 months ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Updated 7 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- ☆16Updated 7 years ago
- Enumerate RIDs using pure Python☆31Updated 10 months ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Updated 6 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- PowerShell module to play with Kerberos S4U extensions☆52Updated 8 years ago
- Office 365 and Exchange domain federation enumeration tool☆13Updated last year
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33Updated 6 years ago
- ☆18Updated 8 years ago