jarilaos / kirbi2hashcat
Convert kirbi ticket from mimikatz into hashcat format to crack it
☆12Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for kirbi2hashcat
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆16Updated 5 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Modified version of PEAS client for offensive operations☆38Updated last year
- Python3 Ebowla... 3Bowla☆17Updated 4 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆16Updated 2 years ago
- ☆51Updated last year
- ☆30Updated 4 years ago
- ☆16Updated 3 years ago
- ☆13Updated 5 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆15Updated 4 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆23Updated 4 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated last month
- ☆24Updated 3 years ago
- Check robustness of your (their) Active Directory accounts passwords☆32Updated 8 months ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆32Updated 11 months ago
- Discord C2 Profile for Mythic☆24Updated 7 months ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆23Updated last year
- Exploits made practicing for OSCE☆22Updated 3 years ago
- Tool written in Rust to perform Password Spraying attacks against Azure/Office 365 accounts☆16Updated 9 months ago
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆18Updated last year
- Nemesis agent for Mythic☆24Updated 2 months ago
- Azure pentesting reference for Altered Security Lab☆24Updated 2 years ago
- ☆15Updated last year
- Linux Post-Exploitation tools wrapper☆20Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago