SySS-Research / hashcathelper
Convenience tool for hashcat
☆109Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for hashcathelper
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆158Updated last year
- pysnaffler☆86Updated 3 months ago
- ☆112Updated last year
- Some scripts to support with importing large datasets into BloodHound☆78Updated 11 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆147Updated 3 weeks ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆79Updated last year
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆113Updated 6 months ago
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆147Updated last month
- ☆151Updated 2 weeks ago
- linikatz is a tool to attack AD on UNIX☆138Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆82Updated last year
- Living Off the Foreign Land setup scripts☆63Updated 3 weeks ago
- ☆36Updated last month
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆35Updated 8 months ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆80Updated 6 months ago
- A Python POC for CRED1 over SOCKS5☆134Updated last month
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆31Updated last year
- using graph proxy to monitor teams user presence☆51Updated 4 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆166Updated last year
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆141Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆69Updated last year
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆119Updated 3 years ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆70Updated this week
- Hybrid AD utilities for ROADtools☆63Updated last week
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆85Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆75Updated 2 years ago
- Python setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆78Updated 3 weeks ago
- Timeroasting scripts by Tom Tervoort☆182Updated last year
- ☆127Updated 3 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆36Updated 7 months ago