mlgualtieri / NTLMRawUnHideLinks
NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The following binary network packet capture formats are supported: *.pcap *.pcapng *.cap *.etl
☆378Updated 2 years ago
Alternatives and similar repositories for NTLMRawUnHide
Users that are interested in NTLMRawUnHide are comparing it to the libraries listed below
Sorting:
- ☆407Updated 6 months ago
- IOXIDResolver.py from AirBus Security☆263Updated 2 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆583Updated 3 months ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆271Updated 2 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆284Updated 2 years ago
- Dumping LAPS from Python☆283Updated 2 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆277Updated 3 years ago
- ☆472Updated 3 years ago
- ☆296Updated last year
- Kerberoast attack -pure python-☆436Updated 2 years ago
- Dump ntds.dit really fast☆409Updated 4 years ago
- Office 365 and Exchange Enumeration☆199Updated 6 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆237Updated 3 years ago
- scan for NTLM directories☆375Updated 3 months ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆436Updated 11 months ago
- BadAssMacros - C# based automated Malicous Macro Generator.☆429Updated 3 years ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆385Updated last year
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆368Updated 5 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆907Updated 4 years ago
- ☆813Updated 3 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆397Updated 4 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆443Updated 3 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆201Updated 4 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆246Updated last week
- ☆245Updated 2 years ago
- NTLMv1 Multitool☆651Updated this week
- Amplify network visibility from multiple POV of other hosts☆305Updated last year
- LDAP library for auditing MS AD☆477Updated last month
- ☆534Updated 4 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆306Updated 2 years ago