Tools for NTDS.dit
☆17Apr 26, 2018Updated 7 years ago
Alternatives and similar repositories for ntds-tools
Users that are interested in ntds-tools are comparing it to the libraries listed below
Sorting:
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- A simple backdoor in (ba)sh with encrypted communication channel☆26Dec 16, 2016Updated 9 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Feb 1, 2024Updated 2 years ago
- Windows Offline Common Password Hash Checker☆29Aug 9, 2016Updated 9 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- A tool for automated MITM attacks on SSL connections.☆22May 18, 2012Updated 13 years ago
- ☆13May 28, 2013Updated 12 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- A multi-codec media fuzzing tool.☆43Oct 9, 2012Updated 13 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Installers that are a PITA to find☆18Jun 9, 2021Updated 4 years ago
- Tutorial for Node.js security☆21Sep 4, 2020Updated 5 years ago
- Decrypt MITM SSL RDP and save to pcap☆53May 1, 2014Updated 11 years ago
- Quick scan to find live hosts on the network/across networks☆48Jul 4, 2014Updated 11 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Jul 1, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Comprehensive parsing script for grepable Nmap output files. Provides a summary table, split hosts files, and URLs for web and SMB hosts.☆20Apr 17, 2020Updated 5 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆17Feb 10, 2016Updated 10 years ago
- ☆47Sep 3, 2025Updated 5 months ago
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- IRMA ansible☆24Nov 28, 2016Updated 9 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆87Sep 26, 2016Updated 9 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- Remote shell/exfiltration using keyboard leds.☆26Jul 27, 2017Updated 8 years ago
- 📡 A security research tool with shodan integration☆25Sep 6, 2018Updated 7 years ago
- A websocket proxy☆55Nov 13, 2017Updated 8 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 11 years ago