MzHmO / LeakedWallpaper
Leak of any user's NetNTLM hash. Fixed in KB5040434
☆249Updated 6 months ago
Alternatives and similar repositories for LeakedWallpaper:
Users that are interested in LeakedWallpaper are comparing it to the libraries listed below
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆276Updated 3 months ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆434Updated 3 weeks ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆281Updated 3 months ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆186Updated 4 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆138Updated last month
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆274Updated 3 months ago
- Attempt at Obfuscated version of SharpCollection☆203Updated 2 weeks ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆158Updated 2 months ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆393Updated 8 months ago
- Impacket is a collection of Python classes for working with network protocols.☆273Updated last month
- ☆192Updated 11 months ago
- ☆271Updated last year
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆157Updated 2 weeks ago
- Evasive Golang Loader☆129Updated 7 months ago
- ☆250Updated this week
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆298Updated 9 months ago
- Fileless atexec, no more need for port 445☆355Updated 11 months ago
- ☆138Updated last year
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆224Updated last month
- Extracting NetNTLM without touching lsass.exe☆234Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆194Updated 8 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆429Updated 3 weeks ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆144Updated 10 months ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆230Updated last year
- Escalate Service Account To LocalSystem via Kerberos☆393Updated last year
- A collection of code snippets built to assist with breaking chains.☆117Updated 10 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆188Updated 4 months ago
- Use ESC1 to perform a makeshift DCSync and dump hashes☆203Updated last year