joey-melo / netcredzLinks
With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, FTP, and Kerberos, while also detecting DHCPv6 and LLMNR traffic. Inspired by PCredz from Laurent Gaffie
☆72Updated last year
Alternatives and similar repositories for netcredz
Users that are interested in netcredz are comparing it to the libraries listed below
Sorting:
- ☆120Updated 7 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆164Updated last year
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆243Updated last week
- Azure Post Exploitation Framework☆243Updated 2 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆274Updated last week
- Parses Snaffler output file and generate beautified outputs.☆113Updated 11 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆205Updated last year
- Generate and Manage KeyCredentialLinks☆180Updated 2 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 5 months ago
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆154Updated 5 months ago
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆256Updated last month
- ☆229Updated 6 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 7 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆257Updated 10 months ago
- A community-driven collection of BloodHound queries☆158Updated last week
- Group Policy Objects manipulation and exploitation framework☆282Updated 3 weeks ago
- Fast context enumeration for newly obtained Active Directory credentials.☆85Updated 4 months ago
- ☆154Updated 8 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆213Updated last week
- Weaponizing DCOM for NTLM Authentication Coercions☆275Updated 5 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 6 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆196Updated last year
- ☆177Updated last week
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆253Updated last month
- ☆224Updated 7 months ago
- ☆101Updated last month
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆173Updated 4 months ago
- Hybrid AD utilities for ROADtools☆102Updated 7 months ago
- ☆154Updated 9 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆211Updated 6 months ago