koparmalbaris / NTLM-DementorLinks
Get all NetNTLM Hashes via Different zero-click Methodologies from LLMNR Poisoning
☆18Updated 3 years ago
Alternatives and similar repositories for NTLM-Dementor
Users that are interested in NTLM-Dementor are comparing it to the libraries listed below
Sorting:
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Small tool to scan On-Premises Exchange servers, useful for analytical purposes and patch management☆20Updated 2 years ago
- ☆12Updated 2 years ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆34Updated 2 years ago
- Scripts that automate portions of pentests.☆50Updated last month
- Powershell - Simple HTTP Server☆13Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- ☆21Updated 3 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- ☆71Updated last year
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆87Updated 2 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆16Updated last year
- ☆47Updated 3 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆91Updated last year
- Creates and sends fake meeting invite☆61Updated 4 years ago
- Checks for signature requirements over LDAP☆97Updated 2 years ago
- Custom queries list for BloodHound☆28Updated 9 months ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆53Updated 9 months ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- ☆15Updated 3 years ago
- ☆50Updated 2 years ago
- Active Directory ACL exploitation with BloodHound☆12Updated 4 years ago
- ☆13Updated last month
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆45Updated 2 years ago
- Efflanrs - GUI for Snaffler Output☆26Updated 8 months ago