blazeinfosec / ssrf-ntlmView external linksLinks
Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.
☆57Dec 18, 2017Updated 8 years ago
Alternatives and similar repositories for ssrf-ntlm
Users that are interested in ssrf-ntlm are comparing it to the libraries listed below
Sorting:
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Sysmon Config Pusher - Modernized☆32Jan 7, 2026Updated last month
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- This repository contains some details about abusing outlook.☆27Aug 17, 2018Updated 7 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- ☆28Jan 3, 2021Updated 5 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- print syntax highlighted file to terminal☆13Jun 29, 2015Updated 10 years ago
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 11 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- The Outlook HTML Leak Test Project☆131May 12, 2018Updated 7 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Oct 21, 2014Updated 11 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆116May 19, 2020Updated 5 years ago
- OFFICE DDEAUTO Payload Generation script☆128Dec 19, 2020Updated 5 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆177May 22, 2018Updated 7 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Jan 13, 2018Updated 8 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- A simple framework for distributed task workflow using redis.☆32Jan 13, 2014Updated 12 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆107May 29, 2014Updated 11 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- ☆49Jul 26, 2014Updated 11 years ago
- Desktop app that crawls urls from Google's search engine results☆17Mar 5, 2024Updated last year
- NSA headline generator☆32Feb 11, 2014Updated 12 years ago
- Demo server for testing Java deserialization payloads☆15Sep 18, 2016Updated 9 years ago
- Stealing passwords every time they change☆66Mar 19, 2020Updated 5 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Sep 19, 2016Updated 9 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 7 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆71Jan 21, 2019Updated 7 years ago
- A Report Generation Tool for Security Assessment☆65Dec 31, 2018Updated 7 years ago