preempt / ntlm-scanner
A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities
☆200Updated 3 years ago
Related projects: ⓘ
- Domain user enumeration tool☆212Updated 10 months ago
- A curated list of awesome BloodhoundAD resources☆224Updated last year
- Resources for our Active Directory security workshops☆139Updated 3 years ago
- Collection of cyphers for bloodhound☆141Updated 2 months ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆170Updated last year
- ☆119Updated this week
- An Insider Threat Toolkit☆149Updated 5 years ago
- Fake User Generator for Active Directory Environments☆156Updated 5 years ago
- ☆165Updated 4 years ago
- Repo with various Red Team scripts☆144Updated 3 years ago
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆192Updated 5 years ago
- Microsoft External Attack Tool☆177Updated last year
- Various Cheat Sheets☆179Updated 3 years ago
- Tool that automates Active Directory enumeration☆87Updated 3 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆58Updated 2 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆89Updated 5 years ago
- Weaponizing Splunk with reverse and bind shells.☆172Updated 7 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆105Updated 4 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆166Updated 4 years ago
- Active Directory Lab for Penetration Testing☆48Updated 3 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆300Updated 2 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆92Updated 2 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆244Updated 3 months ago
- Some .ps1 scripts for pentesting☆131Updated 3 years ago
- Office 365 and Exchange Enumeration☆176Updated 5 years ago
- lateral movement techniques that can be used during red team exercises☆265Updated 4 years ago
- ☆137Updated 4 years ago
- Disposable and resilient red team infrastructure with Terraform☆248Updated 5 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆312Updated 4 years ago
- ☆251Updated 2 years ago