With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, FTP, and Kerberos, while also detecting DHCPv6 and LLMNR traffic. Inspired by PCredz from Laurent Gaffie
☆79Dec 2, 2024Updated last year
Alternatives and similar repositories for netcredz
Users that are interested in netcredz are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Various AD tools needed for penetration testing in one place.☆24Jul 13, 2023Updated 2 years ago
- ☆36Nov 26, 2024Updated last year
- ☆15Jun 27, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Token impersonation in PowerShell to execute under the context of another user.☆25Oct 14, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A collection of content for blue team professionals, designed to support both reactive and proactive cybersecurity measures of every aspe…☆33Apr 2, 2026Updated last month
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- Ping-based Information Lookup and Outbound Transfer☆79Apr 16, 2024Updated 2 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated last year
- Dump processes over WMI with MSFT_MTProcess☆85Feb 13, 2026Updated 2 months ago
- ☆50Jun 4, 2025Updated 11 months ago
- Find potential DLL Sideloads on your windows computer☆220Jan 12, 2025Updated last year
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Polymorphic PE rewriter for Windows x64 , rewrites binaries into semantically identical but byte-different variants☆134Updated this week
- ☆19Sep 1, 2025Updated 8 months ago
- A PoC for Early Cascade process injection technique.☆216Jan 30, 2025Updated last year
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆401Jul 23, 2025Updated 9 months ago
- Knowledge Management for Offensive Security Professionals Official Repository☆153Feb 25, 2025Updated last year
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 10 months ago
- Custom built Syntax Highlight tool for Word Documents☆27Sep 13, 2024Updated last year
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- ☆899Mar 25, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆397Jan 20, 2026Updated 3 months ago
- ☆109Feb 14, 2026Updated 2 months ago
- User-Defined C2 BOF Template☆33Nov 24, 2025Updated 5 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆192Apr 26, 2025Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Sep 18, 2023Updated 2 years ago
- ☆139Nov 17, 2025Updated 5 months ago
- ☆51Feb 8, 2024Updated 2 years ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆640May 8, 2025Updated last year
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Dump Kerberos tickets☆46Aug 4, 2025Updated 9 months ago
- OSEP - Offsec Expert Professional☆21Jun 23, 2024Updated last year
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 5 months ago
- The tool 𝗲𝗻𝘂𝗺𝘅 is a framework built for Kali Linux that uses a plethora of existing pentesting tools as plugins in order to simplify…☆38Jan 12, 2025Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆386Oct 14, 2025Updated 6 months ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆690Aug 15, 2025Updated 8 months ago
- Indirect syscalls + DInvoke made simple.☆97Dec 24, 2024Updated last year