KoreLogicSecurity / wmkickLinks
WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSMan/WinRM (5985/tcp) to capture NetNTLMv2 hashes.
☆42Updated 4 years ago
Alternatives and similar repositories for wmkick
Users that are interested in wmkick are comparing it to the libraries listed below
Sorting:
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Updated 3 years ago
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆60Updated 2 years ago
- ☆12Updated 5 years ago
- Tool to perform lateral movement between AAD joined devices☆64Updated 3 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆80Updated 2 years ago
- WMI SA stuffs☆30Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆25Updated 3 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆55Updated 4 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- A Visual Studio Code Extension agent for Mythic C2☆72Updated last year
- Python Script for SAML2 Authentication Passwordspray☆42Updated 2 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆43Updated 4 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- Repository for LNK stuff☆31Updated 3 years ago
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- ☆59Updated 2 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- ☆27Updated 4 years ago
- ☆23Updated 3 years ago
- Execute Mimikatz with different technique☆51Updated 4 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Updated 4 years ago
- ☆33Updated 5 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Updated 4 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆74Updated 7 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 7 months ago
- Log converter from CS log to Ghostwriter CSV☆31Updated 4 years ago