mlgualtieri / NTLMRawUnHideLinks
NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The following binary network packet capture formats are supported: *.pcap *.pcapng *.cap *.etl
☆349Updated last year
Alternatives and similar repositories for NTLMRawUnHide
Users that are interested in NTLMRawUnHide are comparing it to the libraries listed below
Sorting:
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆280Updated last year
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆545Updated 2 years ago
- Dumping LAPS from Python☆267Updated 2 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆262Updated last year
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆860Updated 3 years ago
- IOXIDResolver.py from AirBus Security☆250Updated last year
- ☆395Updated 9 months ago
- Tools for Kerberos PKINIT and relaying to AD CS☆765Updated 5 months ago
- Partial python implementation of SharpGPOAbuse☆429Updated 2 weeks ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆382Updated 4 years ago
- ☆781Updated 2 years ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆422Updated 5 months ago
- Bypass for PowerShell Constrained Language Mode☆392Updated 3 years ago
- ☆388Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆233Updated 3 years ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆635Updated 3 weeks ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆439Updated 3 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound, and also supports full-object dumping …☆970Updated 2 weeks ago
- scan for NTLM directories☆361Updated last week
- FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE acces…☆416Updated 3 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆302Updated last year
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆363Updated 4 years ago
- ☆293Updated 11 months ago
- Office 365 and Exchange Enumeration☆186Updated 6 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆286Updated last year
- Kerberoast attack -pure python-☆434Updated last year
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆168Updated 2 years ago
- Extracts Key Values from .keytab files☆276Updated 4 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆362Updated 11 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆217Updated 4 years ago