mlgualtieri / NTLMRawUnHideLinks
NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The following binary network packet capture formats are supported: *.pcap *.pcapng *.cap *.etl
☆366Updated last year
Alternatives and similar repositories for NTLMRawUnHide
Users that are interested in NTLMRawUnHide are comparing it to the libraries listed below
Sorting:
- ☆408Updated 4 months ago
- IOXIDResolver.py from AirBus Security☆257Updated last year
- Dumping LAPS from Python☆278Updated 2 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆563Updated last month
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆270Updated last year
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆281Updated 3 years ago
- ☆468Updated 2 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆282Updated 2 years ago
- Kerberoast attack -pure python-☆436Updated last year
- Office 365 and Exchange Enumeration☆191Updated 6 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆390Updated 4 years ago
- scan for NTLM directories☆368Updated last month
- Password spraying and bruteforcing tool for Active Directory Domain Services☆383Updated 11 months ago
- Amplify network visibility from multiple POV of other hosts☆305Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆236Updated 3 years ago
- ☆803Updated 3 years ago
- BadAssMacros - C# based automated Malicous Macro Generator.☆429Updated 3 years ago
- ☆237Updated 2 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆897Updated 4 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆230Updated last month
- Dump ntds.dit really fast☆404Updated 4 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆367Updated 4 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆199Updated 3 years ago
- ☆296Updated last year
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆323Updated 2 years ago
- ☆532Updated 3 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆444Updated 2 years ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆431Updated 9 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆303Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆511Updated 10 months ago