JacksonVD / PwnedPasswordsNTLMLinks
Quick binary search for NTLM hash dataset
☆17Updated 6 years ago
Alternatives and similar repositories for PwnedPasswordsNTLM
Users that are interested in PwnedPasswordsNTLM are comparing it to the libraries listed below
Sorting:
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Updated 4 months ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆37Updated 2 years ago
- This script runs several security checks and makes modifications (with your permission) to your Active Directory domain to improve it's s…☆45Updated 9 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆69Updated 7 years ago
- Smb Scanner from PingCastle☆124Updated 6 years ago
- Digital Preservation Software (National Archives of Australia)☆37Updated 14 years ago
- Presentation Slides☆26Updated 6 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Updated 6 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆116Updated 5 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Updated 6 years ago
- Set of ultra technical notes about AD☆18Updated 7 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Updated 7 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Updated 7 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Updated 5 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆50Updated 7 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Updated 7 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38Updated 6 years ago
- A tool to evaluate the password health of Active Directory accounts.☆43Updated 10 months ago
- Get all AD objects which are hidden from you☆18Updated 8 years ago
- Builds a hashmap of AD NTLM hashes/usernames and iterates through a second list of hashes checking for the existence of each entry in the…☆77Updated 5 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆94Updated 7 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- gpocheck☆30Updated last year
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- Repository for my ATT&CK analysis research.☆69Updated 6 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Updated 6 years ago
- ☆58Updated 5 years ago
- A collection of useful scripts☆24Updated 7 years ago