Modified version of Pypykatz to print encrypted credentials
☆56Dec 26, 2022Updated 3 years ago
Alternatives and similar repositories for Pypykatz
Users that are interested in Pypykatz are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆20Dec 26, 2022Updated 3 years ago
- Recovering NTLM hashes from Credential Guard☆377Dec 26, 2022Updated 3 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 4 years ago
- ☆48Dec 5, 2025Updated 3 months ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆11Sep 2, 2020Updated 5 years ago
- query specific user and login IP from remote machine☆18Nov 19, 2022Updated 3 years ago
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- Credential Guard Bypass Via Patching Wdigest Memory☆337Feb 3, 2023Updated 3 years ago
- To audit the security of read-only domain controllers☆118Nov 27, 2023Updated 2 years ago
- enc8 密码碰撞脚本☆33Jan 31, 2023Updated 3 years ago
- mssqlproxy python3.5+ 并修复bug☆65Mar 15, 2023Updated 3 years ago
- ☆11Nov 17, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆245May 5, 2024Updated last year
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 3 years ago
- A Patchless AMSI Bypass Technique using VEH²☆32Jun 22, 2025Updated 9 months ago
- C# Tool to interact with MS Exchange based on MS docs☆102Dec 7, 2022Updated 3 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago
- UAC Bypass By Abusing Kerberos Tickets☆506Aug 10, 2023Updated 2 years ago
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆402Feb 6, 2023Updated 3 years ago
- BOF内存运行exe☆31Jun 19, 2023Updated 2 years ago
- 利用RPC服务,内网批量探测Windows出网☆14Jun 24, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- cloudflare socks5 server☆40Jul 18, 2025Updated 8 months ago
- ☆705Nov 7, 2023Updated 2 years ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Dec 24, 2022Updated 3 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Mar 26, 2020Updated 6 years ago
- Some Service DCOM Object and SeImpersonatePrivilege abuse.☆372Dec 9, 2022Updated 3 years ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆282Feb 24, 2025Updated last year
- dump lsass tool☆38Oct 10, 2022Updated 3 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆87Mar 22, 2023Updated 3 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆413Mar 21, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆46Jun 24, 2023Updated 2 years ago
- different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)☆203Aug 2, 2023Updated 2 years ago
- A Windows potato to privesc☆391Aug 26, 2024Updated last year
- Aggressor script add-in for CobaltStrike to track file uploads☆48Nov 7, 2022Updated 3 years ago
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- Cobalt Strike BOF that Add a user to localgroup by samr☆135Nov 30, 2022Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆303Oct 26, 2022Updated 3 years ago