p0dalirius / msFlagsDecoderLinks
Decode the values of common Windows properties such as userAccountControl and sAMAccountType.
☆23Updated 2 years ago
Alternatives and similar repositories for msFlagsDecoder
Users that are interested in msFlagsDecoder are comparing it to the libraries listed below
Sorting:
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆25Updated 2 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆32Updated last week
- The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.☆64Updated 2 months ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Updated 10 months ago
- A Python script to find tenant id an region from a list of domain names.☆15Updated 10 months ago
- A python wrapper to run a command on against all users/computers/DCs of a Windows Domain☆28Updated 3 years ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆11Updated 10 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 2 years ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆21Updated last year
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆40Updated last month
- MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)☆20Updated 3 years ago
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆24Updated last year
- Multithreaded spraying of a password on all accounts of a domain.☆25Updated 10 months ago
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆28Updated 10 months ago
- ☆27Updated 2 years ago
- A Python native library containing necessary classes, functions and structures to interact with Windows Active Directory.☆69Updated last week
- ☆43Updated 10 months ago
- ☆40Updated last year
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆14Updated 4 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- ☆29Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 8 months ago
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆47Updated 2 months ago
- A webshell plugin and interactive shell for pentesting a LimeSurvey application.☆22Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 10 months ago
- ☆44Updated last year
- crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.☆30Updated 3 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated 2 years ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Updated 10 months ago