p0dalirius / windows-cryptographic-and-hashing-algorithms-explained
Detailed explanation of Windows cryptographic algorithms, with examples and schemes.
☆18Updated 5 months ago
Alternatives and similar repositories for windows-cryptographic-and-hashing-algorithms-explained
Users that are interested in windows-cryptographic-and-hashing-algorithms-explained are comparing it to the libraries listed below
Sorting:
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆18Updated 3 months ago
- Decode the values of common Windows properties such as userAccountControl and sAMAccountType.☆21Updated last year
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆10Updated 3 months ago
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆18Updated 3 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆20Updated last month
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆24Updated last year
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆21Updated last year
- A Python script to find tenant id an region from a list of domain names.☆14Updated 3 months ago
- ☆13Updated 4 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆19Updated 2 months ago
- Golang Implementation of Hell's gate☆17Updated last year
- ECC Public Key Cryptography☆37Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆25Updated last year
- ☆11Updated 2 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 9 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆15Updated last month
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆21Updated 3 months ago
- A webshell plugin and interactive shell for pentesting a LimeSurvey application.☆19Updated 6 months ago
- Dumping LSA secrets: a story about task decorrelation☆14Updated 10 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Simple reverse ICMP shell☆14Updated last year
- Tool to aid in dumping LSASS process remotely☆38Updated 9 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- Extract the windows major and minor build numbers from an ISO file, and automatically sort the iso files.☆15Updated 7 months ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆21Updated last month
- Multithreaded spraying of a password on all accounts of a domain.☆20Updated 3 months ago