p0dalirius / Hashes-Harvester
Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.
☆23Updated last year
Alternatives and similar repositories for Hashes-Harvester:
Users that are interested in Hashes-Harvester are comparing it to the libraries listed below
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆20Updated 2 years ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆23Updated 3 months ago
- The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.☆63Updated 6 months ago
- MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)☆16Updated 2 years ago
- Decode the values of common Windows properties such as userAccountControl and sAMAccountType.☆21Updated last year
- A python wrapper to run a command on against all users/computers/DCs of a Windows Domain☆28Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated 3 months ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆33Updated 3 months ago
- ☆25Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 4 months ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆11Updated 9 months ago
- My BloodHound custom queries☆23Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆18Updated 4 months ago
- Federated Office365 user enumeration based on correlated response trend analysis☆48Updated 2 years ago
- A webshell plugin and interactive shell for pentesting a LimeSurvey application.☆17Updated 3 months ago
- Extract registry and NTDS secrets from local or remote disk images☆36Updated 4 months ago
- A collection of python scripts to work with Windows Hives.☆15Updated 2 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated 4 months ago
- ☆13Updated 3 weeks ago
- ☆52Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆36Updated 10 months ago
- ☆70Updated last year
- ☆34Updated this week
- ☆43Updated 6 months ago
- Automatically deploy Nemesis☆20Updated 7 months ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆15Updated last year