KoreLogicSecurity / wmkickLinks
WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSMan/WinRM (5985/tcp) to capture NetNTLMv2 hashes.
☆42Updated 4 years ago
Alternatives and similar repositories for wmkick
Users that are interested in wmkick are comparing it to the libraries listed below
Sorting:
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Updated 4 years ago
- Tool to perform lateral movement between AAD joined devices☆66Updated 3 years ago
- WMI SA stuffs☆30Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆25Updated 3 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- ☆12Updated 5 years ago
- RDP Checker☆65Updated last year
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆60Updated 2 years ago
- ☆43Updated 3 years ago
- ☆37Updated 5 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆31Updated 5 years ago
- Execute Mimikatz with different technique☆51Updated 4 years ago
- Python Script for SAML2 Authentication Passwordspray☆42Updated 2 years ago
- A fast wordlist to nthash converter☆21Updated 4 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Updated 4 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆74Updated 10 months ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆43Updated 4 years ago
- basic proxy as an azure function serverless app☆18Updated 3 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated last month
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 3 years ago
- ☆53Updated 5 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 6 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Updated 4 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆79Updated 2 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Updated 4 years ago