KoreLogicSecurity / wmkickLinks
WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSMan/WinRM (5985/tcp) to capture NetNTLMv2 hashes.
☆38Updated 3 years ago
Alternatives and similar repositories for wmkick
Users that are interested in wmkick are comparing it to the libraries listed below
Sorting:
- WMI SA stuffs☆30Updated 3 years ago
- ☆12Updated 4 years ago
- ☆18Updated last year
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆43Updated 3 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15Updated 4 years ago
- ☆18Updated 4 years ago
- ☆42Updated 2 months ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Cisco Unfied Call Manager enumeration☆23Updated 2 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆27Updated 11 months ago
- ☆12Updated 5 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- ☆25Updated 3 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆18Updated 4 months ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆23Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆31Updated 3 years ago
- Firebase Domain Front Code☆21Updated 4 years ago
- ☆24Updated 4 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 3 years ago