NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The following binary network packet capture formats are supported: *.pcap *.pcapng *.cap *.etl
☆388Nov 13, 2023Updated 2 years ago
Alternatives and similar repositories for NTLMRawUnHide
Users that are interested in NTLMRawUnHide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Self-developed tools for Lateral Movement/Code Execution☆721Aug 17, 2021Updated 4 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆624Aug 15, 2025Updated 7 months ago
- Pass the Hash to a named pipe for token Impersonation☆310Nov 29, 2023Updated 2 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆617Feb 16, 2023Updated 3 years ago
- .NET Project for Attacking vCenter☆557Nov 11, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Jul 11, 2020Updated 5 years ago
- Dumping DPAPI credz remotely☆1,349Mar 24, 2025Updated last year
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆817Oct 27, 2023Updated 2 years ago
- SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader☆1,314Oct 1, 2019Updated 6 years ago
- Get file less command execution for lateral movement.☆637Jun 3, 2022Updated 3 years ago
- PowerShell MachineAccountQuota and DNS exploit tools☆1,449Jan 11, 2023Updated 3 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,455Dec 18, 2022Updated 3 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆845Dec 2, 2023Updated 2 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,068Mar 20, 2026Updated 3 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,617Jul 10, 2023Updated 2 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,275Dec 9, 2025Updated 4 months ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆870Mar 20, 2023Updated 3 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- A (partial) Python rewriting of PowerSploit's PowerView☆1,107Mar 5, 2026Updated last month
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆374Oct 30, 2020Updated 5 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆822Dec 14, 2023Updated 2 years ago
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,564Mar 11, 2026Updated 3 weeks ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆416Jan 27, 2024Updated 2 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆257Dec 2, 2021Updated 4 years ago
- Mimikatz implementation in pure Python☆3,276Updated this week
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆427Apr 22, 2021Updated 4 years ago
- ☆185Jan 5, 2021Updated 5 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆646Mar 20, 2024Updated 2 years ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆456Dec 23, 2020Updated 5 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆364Dec 13, 2025Updated 3 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆936Nov 11, 2024Updated last year
- Print Spooler Named Pipe Impersonation for Cobalt Strike☆272Jun 13, 2020Updated 5 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 3 years ago
- ☆834Sep 9, 2022Updated 3 years ago
- Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019☆1,816Sep 4, 2024Updated last year
- Dump ntds.dit really fast☆410Oct 1, 2021Updated 4 years ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆442Jan 4, 2025Updated last year