p0dalirius / windows-cryptographic-and-hashing-algorithms-explainedLinks
Detailed explanation of Windows cryptographic algorithms, with examples and schemes.
☆20Updated 8 months ago
Alternatives and similar repositories for windows-cryptographic-and-hashing-algorithms-explained
Users that are interested in windows-cryptographic-and-hashing-algorithms-explained are comparing it to the libraries listed below
Sorting:
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆23Updated 6 months ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆10Updated 6 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆20Updated 4 months ago
- Decode the values of common Windows properties such as userAccountControl and sAMAccountType.☆23Updated last year
- A Python script to find tenant id an region from a list of domain names.☆15Updated 6 months ago
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Updated 5 months ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆26Updated last year
- A python wrapper to run a command on against all users/computers/DCs of a Windows Domain☆28Updated 2 years ago
- ☆35Updated 10 months ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆12Updated 6 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆21Updated 5 months ago
- ☆16Updated last year
- Multithreaded spraying of a password on all accounts of a domain.☆22Updated 5 months ago
- Tool to aid in dumping LSASS process remotely☆40Updated last year
- A port of classic netcat to C#☆33Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- Extract the windows major and minor build numbers from an ISO file, and automatically sort the iso files.☆16Updated 10 months ago
- ☆52Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆30Updated last month
- The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.☆64Updated 6 months ago
- ECC Public Key Cryptography☆39Updated last year
- Docker container for running CobaltStrike 4.7 and above☆22Updated 4 months ago
- Just another Process Injection using Process Hollowing technique.☆18Updated last year
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆123Updated 10 months ago
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆23Updated 5 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Updated 6 months ago
- quASAR: ASAR manipulation made easy☆38Updated 2 years ago
- A multithreaded bruteforcer of argon2 hashes.☆40Updated 2 months ago
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆19Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year