PortSwigger / ntlm-challenge-decoderLinks
Burp extension to decode NTLM SSP headers and extract domain/host information
☆9Updated 4 years ago
Alternatives and similar repositories for ntlm-challenge-decoder
Users that are interested in ntlm-challenge-decoder are comparing it to the libraries listed below
Sorting:
- Parse NTLM challenge messages over HTTP and SMB☆149Updated 2 years ago
- CobaltStrike External C2 for Websockets☆193Updated 6 years ago
- This Repository contains the stuff related to windows Active directory environment exploitation☆152Updated last year
- Discover Printers☆169Updated 5 years ago
- Example Vulnerable .NET HTTP Remoting☆86Updated 6 years ago
- Burp Suite extension to discover assets from HTTP response.☆16Updated 4 years ago
- ☆211Updated 6 years ago
- checkO365 is a tool to check if a target domain is using O365☆84Updated 7 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆30Updated 3 years ago
- Spray a hash via smb to check for local administrator access☆143Updated 4 years ago
- ☆193Updated 5 years ago
- Aggressor Scripts for Cobalt Strike☆76Updated last year
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆141Updated 4 years ago
- RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer☆55Updated 5 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆173Updated 4 years ago
- Various Aggressor Scripts I've Created.☆149Updated 3 years ago
- PEAS is a Python 2 library and command line application for running commands on an ActiveSync server e.g. Microsoft Exchange.☆178Updated 2 years ago
- WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit☆49Updated 5 years ago
- Exploitation toolkit for RichFaces☆103Updated last year
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 5 years ago
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆174Updated 4 years ago
- ☆236Updated 6 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 5 years ago
- CVE-2020-0688_EXP Auto trigger payload & encrypt method☆146Updated 5 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆107Updated 4 years ago
- CVE-2018-8581☆372Updated 2 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆99Updated 2 years ago
- ☆129Updated 7 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆132Updated 6 years ago
- siberas JMX exploitation toolkit☆130Updated 2 years ago