p0dalirius / windows-cryptographic-and-hashing-algorithms-explained
Detailed explanation of Windows cryptographic algorithms, with examples and schemes.
☆18Updated 4 months ago
Alternatives and similar repositories for windows-cryptographic-and-hashing-algorithms-explained:
Users that are interested in windows-cryptographic-and-hashing-algorithms-explained are comparing it to the libraries listed below
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆18Updated 2 months ago
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆17Updated 2 months ago
- Decode the values of common Windows properties such as userAccountControl and sAMAccountType.☆21Updated last year
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆20Updated 3 weeks ago
- A Python script to find tenant id an region from a list of domain names.☆14Updated 2 months ago
- A python tool to parse and describe the SDDL string.☆12Updated 2 months ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆24Updated last year
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆10Updated 2 months ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆24Updated 8 months ago
- Golang Implementation of Hell's gate☆17Updated last year
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆21Updated last year
- BOF for C2 framework☆41Updated 5 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆39Updated last year
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆18Updated 2 months ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆21Updated last week
- ☆11Updated 2 months ago
- Just another Process Injection using Process Hollowing technique.☆17Updated last year
- Simple reverse ICMP shell☆13Updated 11 months ago
- ECC Public Key Cryptography☆37Updated last year
- Unix Process hollowing in rust☆21Updated 4 months ago
- Extract the windows major and minor build numbers from an ISO file, and automatically sort the iso files.☆14Updated 6 months ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Updated 4 months ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆11Updated 3 weeks ago
- ☆21Updated last month
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆14Updated 2 months ago
- Tool to aid in dumping LSASS process remotely☆38Updated 8 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- Extension functionality for the NightHawk operator client☆27Updated last year
- ☆16Updated 2 months ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆25Updated last year