mlgualtieri / NTLMRawUnHide
NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The following binary network packet capture formats are supported: *.pcap *.pcapng *.cap *.etl
☆330Updated last year
Alternatives and similar repositories for NTLMRawUnHide:
Users that are interested in NTLMRawUnHide are comparing it to the libraries listed below
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆519Updated 2 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆809Updated 3 years ago
- Extracts Key Values from .keytab files☆240Updated 4 years ago
- scan for NTLM directories☆354Updated 7 months ago
- Dumping LAPS from Python☆260Updated 2 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆362Updated 3 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆255Updated last year
- Partial python implementation of SharpGPOAbuse☆388Updated 11 months ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆595Updated 7 months ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆259Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆221Updated 3 years ago
- ☆446Updated 2 years ago
- Password spraying tool and Bloodhound integration☆220Updated last month
- ☆208Updated last year
- Tools for Kerberos PKINIT and relaying to AD CS☆686Updated last month
- ☆358Updated 3 years ago
- LDAP library for auditing MS AD☆403Updated this week
- ☆759Updated 2 years ago
- Kerberoast with ACL abuse capabilities☆403Updated 2 months ago
- ☆362Updated 6 months ago
- Dump ntds.dit really fast☆382Updated 3 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆166Updated 2 years ago
- Bypass for PowerShell Constrained Language Mode☆381Updated 3 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆214Updated last year
- ☆506Updated 3 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆140Updated 3 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆383Updated 10 months ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆412Updated last month
- linikatz is a tool to attack AD on UNIX☆546Updated last year
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆353Updated 4 years ago