KoreLogicSecurity / wmkickLinks
WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSMan/WinRM (5985/tcp) to capture NetNTLMv2 hashes.
☆38Updated 3 years ago
Alternatives and similar repositories for wmkick
Users that are interested in wmkick are comparing it to the libraries listed below
Sorting:
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- ☆12Updated 4 years ago
- Continuous kerberoast monitor☆45Updated last year
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Updated 4 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Cisco Unfied Call Manager enumeration☆23Updated 3 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 3 years ago
- WMI SA stuffs☆30Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆36Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Firebase Domain Front Code☆21Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15Updated 4 years ago
- ☆18Updated last year
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 4 years ago
- Converts / formats Rubeus kerberoasting output into Hashcat usable format☆11Updated 5 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆56Updated 2 years ago
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Updated 3 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- Tool to perform lateral movement between AAD joined devices☆64Updated 3 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆32Updated 4 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Helpful operator notes and techniques in actionable form☆17Updated last year
- A Canary which fires when uninstalled☆34Updated 4 years ago
- ☆20Updated 5 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆19Updated 5 months ago
- A mini project to exfiltrate data via QR codes☆19Updated last month
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago