puzzlepeaches / NTLMReconLinks
Enumerate information from NTLM authentication enabled web endpoints π
β34Updated 2 years ago
Alternatives and similar repositories for NTLMRecon
Users that are interested in NTLMRecon are comparing it to the libraries listed below
Sorting:
- TokenCertβ100Updated 10 months ago
- Lateral Movementβ124Updated last year
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analysβ¦β84Updated 3 weeks ago
- Lateral Movement via the .NET Profilerβ83Updated 10 months ago
- Click Once + App Domainβ63Updated last year
- Modified versions of the Cobalt Strike Process Injection Kitβ101Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.β74Updated last year
- β110Updated 7 months ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDRβ75Updated last year
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your aβ¦β74Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.β75Updated 2 years ago
- β83Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)β58Updated 9 months ago
- Decrypt Veeam database passwordsβ162Updated last year
- This technique leverages PowerShell'sΒ .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typβ¦β51Updated 4 months ago
- C# version of NTLMRawUnHideβ72Updated 2 years ago
- β91Updated last year
- A C# tool to output crackable DPAPI hashes from user MasterKeysβ136Updated last year
- β49Updated 3 months ago
- Lockless BOFβ79Updated 5 months ago
- β98Updated last year
- Extract registry and NTDS secrets from local or remote disk imagesβ43Updated 6 months ago
- β57Updated 7 months ago
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.β¦β102Updated 11 months ago
- A BOF to enumerate system process, their protection levels, and more.β120Updated 10 months ago
- Microsoft Graph API post-exploitation toolkitβ94Updated last year
- β112Updated 10 months ago
- β65Updated last year
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCSβ149Updated 7 months ago
- To audit the security of read-only domain controllersβ118Updated last year