A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities
☆205Nov 8, 2020Updated 5 years ago
Alternatives and similar repositories for ntlm-scanner
Users that are interested in ntlm-scanner are comparing it to the libraries listed below
Sorting:
- Create a minidump of the LSASS process from memory☆261Nov 2, 2022Updated 3 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆229Feb 20, 2020Updated 6 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106May 25, 2020Updated 5 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆242May 5, 2023Updated 2 years ago
- ☆181Feb 3, 2021Updated 5 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆808Aug 28, 2022Updated 3 years ago
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆426Apr 22, 2021Updated 4 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- Active Directory Assessment and Privilege Escalation Script☆1,132Dec 7, 2022Updated 3 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- Search tool to find specific files containing specific words, i.e. files containing passwords..☆743Nov 18, 2020Updated 5 years ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- goddi (go dump domain info) dumps Active Directory domain information☆429May 31, 2022Updated 3 years ago
- Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)☆197Feb 1, 2021Updated 5 years ago
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- Parse NTLM challenge messages over HTTP and SMB☆151Nov 10, 2022Updated 3 years ago
- C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed☆243Aug 12, 2020Updated 5 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆251Mar 31, 2021Updated 4 years ago
- C# Tool to interact with MS Exchange based on MS docs☆102Dec 7, 2022Updated 3 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- Evade sysmon and windows event logging☆625Apr 8, 2020Updated 5 years ago
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- ☆667Nov 17, 2021Updated 4 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆608Aug 5, 2022Updated 3 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆864Mar 20, 2023Updated 2 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆316Dec 19, 2023Updated 2 years ago
- ☆198Mar 19, 2020Updated 5 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆611Feb 16, 2023Updated 3 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 6 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Apr 26, 2020Updated 5 years ago
- Exchange privilege escalations to Active Directory☆806Apr 23, 2023Updated 2 years ago
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆425Jul 27, 2022Updated 3 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆768Feb 16, 2021Updated 5 years ago
- ☆169Dec 8, 2022Updated 3 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- Maximizing BloodHound. Max is a good boy.☆531Apr 25, 2025Updated 10 months ago