fin3ss3g0d / secretsdump.py
Enhanced version of secretsdump.py from Impacket. Adds multi-threading and accepts an input file with a list of target hosts for simultaneous secrets extraction.
☆202Updated last year
Related projects ⓘ
Alternatives and complementary repositories for secretsdump.py
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆263Updated this week
- Reverse shell that can bypass windows defender detection☆151Updated 9 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆239Updated 2 months ago
- Use ESC1 to perform a makeshift DCSync and dump hashes☆198Updated last year
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆189Updated 4 months ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆227Updated last year
- Escalate Service Account To LocalSystem via Kerberos☆390Updated last year
- Continuous password spraying tool☆116Updated 5 months ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆364Updated 4 months ago
- Kill AV/EDR leveraging BYOVD attack☆307Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆156Updated 2 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆246Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆550Updated 4 months ago
- The Official Sliver Armory☆82Updated 3 months ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆158Updated last year
- ☆229Updated 11 months ago
- ☆189Updated last month
- ☆142Updated 8 months ago
- Everything and anything related to password spraying☆126Updated 5 months ago
- ☆163Updated last year
- Different methods to get current username without using whoami☆172Updated 9 months ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆187Updated last year
- ☆280Updated 11 months ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆179Updated 3 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆146Updated 6 months ago
- Attempt at Obfuscated version of SharpCollection☆188Updated last month
- Collection of random RedTeam scripts.☆196Updated 8 months ago
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆132Updated this week
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆131Updated last year