Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later
☆125May 9, 2023Updated 2 years ago
Alternatives and similar repositories for hashmuncher
Users that are interested in hashmuncher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27May 1, 2023Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆261May 10, 2023Updated 2 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year
- Apply a divide and conquer approach to bypass EDRs☆285Oct 19, 2023Updated 2 years ago
- Go implementation of an Extensible Storage Engine parser☆32Mar 21, 2026Updated 3 weeks ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A C# implementation of dumping credentials from Windows Credential Manager☆62Sep 23, 2023Updated 2 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,111Nov 9, 2024Updated last year
- Set of python scripts which perform different ways of command execution via WMI protocol.☆165Jun 29, 2023Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆484Oct 14, 2022Updated 3 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- ☆419Apr 28, 2021Updated 4 years ago
- ☆17Jun 28, 2023Updated 2 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆364Dec 13, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Utilities for Pentesting with BloodHound☆23Apr 7, 2026Updated last week
- Decrypt Veeam database passwords☆222Dec 8, 2025Updated 4 months ago
- A C# utility for interacting with SCCM☆686Mar 30, 2026Updated 2 weeks ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆569Jun 5, 2023Updated 2 years ago
- Python module for running BOFs☆79Nov 28, 2025Updated 4 months ago
- Lockless BOF☆79May 2, 2025Updated 11 months ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆238Sep 3, 2023Updated 2 years ago
- ☆107Jan 4, 2023Updated 3 years ago
- ☆48Feb 11, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- ☆382Jan 19, 2023Updated 3 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆131Jan 14, 2023Updated 3 years ago
- C# version of NTLMRawUnHide☆72Oct 8, 2022Updated 3 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- ☆482Nov 20, 2022Updated 3 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆270Sep 14, 2023Updated 2 years ago
- Patch AMSI and ETW☆250May 8, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,275Dec 9, 2025Updated 4 months ago
- ☆161Feb 8, 2025Updated last year
- My implementation of the GIUDA project in C++☆189Jul 25, 2023Updated 2 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- ☆834Sep 9, 2022Updated 3 years ago
- ☆83Nov 1, 2023Updated 2 years ago