nopfor / ntlm_challenger
Parse NTLM challenge messages over HTTP and SMB
☆144Updated 2 years ago
Alternatives and similar repositories for ntlm_challenger:
Users that are interested in ntlm_challenger are comparing it to the libraries listed below
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆173Updated 6 years ago
- ☆208Updated 6 years ago
- Aggressor scripts for phases of a pen test or red team assessment☆182Updated 7 months ago
- This Repository contains the stuff related to windows Active directory environment exploitation☆148Updated last year
- A Powershell implementation of PrivExchange designed to run under the current user's context☆124Updated 6 years ago
- Various Aggressor Scripts I've Created.☆148Updated 3 years ago
- CobaltStrike External C2 for Websockets☆193Updated 5 years ago
- lateral movement techniques that can be used during red team exercises☆270Updated 5 years ago
- Constrained Language Mode + AMSI bypass all in one☆156Updated 5 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆130Updated 6 years ago
- ☆191Updated 5 years ago
- CVE-2018-8581☆371Updated 2 years ago
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆152Updated 6 years ago
- Malleable C2 profiles for Cobalt Strike☆70Updated 2 years ago
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆200Updated 6 years ago
- SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt…☆193Updated 5 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Updated 2 years ago
- Spray a hash via smb to check for local administrator access☆140Updated 4 years ago
- Automated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt)☆142Updated 7 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 4 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆146Updated 4 years ago
- An Insider Threat Toolkit☆149Updated 6 years ago
- ☆125Updated 4 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆174Updated 4 years ago
- Abusing Exchange via EWS☆146Updated 4 years ago
- Lateral Movement technique using DCOM and HTA☆231Updated 2 years ago
- ☆128Updated last year
- checkO365 is a tool to check if a target domain is using O365☆84Updated 6 years ago
- ☆162Updated 2 years ago