mlgualtieri / NTLMRawUnHide
NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The following binary network packet capture formats are supported: *.pcap *.pcapng *.cap *.etl
☆336Updated last year
Alternatives and similar repositories for NTLMRawUnHide:
Users that are interested in NTLMRawUnHide are comparing it to the libraries listed below
- Dumping LAPS from Python☆265Updated 2 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆530Updated 2 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆258Updated last year
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆374Updated 4 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆836Updated 3 years ago
- Tools for Kerberos PKINIT and relaying to AD CS☆723Updated 3 months ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆270Updated last year
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆610Updated 8 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆228Updated 3 years ago
- Office 365 and Exchange Enumeration☆185Updated 5 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆278Updated last year
- ☆385Updated 7 months ago
- scan for NTLM directories☆354Updated 9 months ago
- Kerberoast with ACL abuse capabilities☆428Updated 3 months ago
- ☆768Updated 2 years ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆418Updated 3 months ago
- ☆291Updated 9 months ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound, and also supports full-object dumping …☆942Updated 3 weeks ago
- Password spraying tool and Bloodhound integration☆229Updated 3 months ago
- Dump ntds.dit really fast☆391Updated 3 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆386Updated last year
- Password spraying and bruteforcing tool for Active Directory Domain Services☆363Updated 5 months ago
- Python version of the C# tool for "Shadow Credentials" attacks☆700Updated last month
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆298Updated last year
- ☆371Updated 3 years ago
- An script to perform kerberos bruteforcing by using impacket☆445Updated 3 years ago
- LDAP library for auditing MS AD☆410Updated 3 weeks ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆216Updated 4 years ago
- Partial python implementation of SharpGPOAbuse☆407Updated last year
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆166Updated 2 years ago