pimps / pdf-NTLMLeaker
This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"
☆26Updated 6 years ago
Alternatives and similar repositories for pdf-NTLMLeaker:
Users that are interested in pdf-NTLMLeaker are comparing it to the libraries listed below
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆13Updated last year
- Linux Post-Exploitation tools wrapper☆20Updated last year
- Open-Source Phishing Toolkit☆18Updated 3 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆24Updated 2 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆22Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆39Updated last year
- Just some random small tools for dealing with asp.net Forms Authentication Cookies☆23Updated 3 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆81Updated last year
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆67Updated 2 years ago
- Convert ldapdomaindump to Bloodhound☆78Updated last year
- Discord C2 Profile for Mythic☆26Updated last week
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆51Updated last year
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆50Updated 6 months ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- ☆10Updated 2 years ago
- This repository serves as a curated resource for OffSec's OSEP (PEN-300) certification preparation, containing useful links, materials, a…☆14Updated 3 months ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆50Updated 3 years ago
- Modified version of PEAS client for offensive operations☆38Updated 2 years ago
- Scan for and exploit the zerologon vulnerability.☆10Updated 4 years ago
- ☆16Updated 2 months ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 2 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆31Updated 2 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Updated 3 years ago
- ☆29Updated 2 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆38Updated 2 years ago
- ☆27Updated last year
- ☆47Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated last month