pwnfoo / NTLMRecon
Enumerate information from NTLM authentication enabled web endpoints π
β480Updated 9 months ago
Alternatives and similar repositories for NTLMRecon:
Users that are interested in NTLMRecon are comparing it to the libraries listed below
- scan for NTLM directoriesβ359Updated 9 months ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders aβ¦β336Updated 6 years ago
- Active Directory ACL exploitation with BloodHoundβ721Updated 3 years ago
- Kerberoast attack -pure python-β427Updated last year
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.β247Updated 10 months ago
- Chameleon: A tool for evading Proxy categorisationβ491Updated 4 months ago
- Disposable and resilient red team infrastructure with Terraformβ265Updated 6 years ago
- PowerSploit - A PowerShell Post-Exploitation Frameworkβ231Updated 3 years ago
- This is a weaponized WSUS exploitβ284Updated 2 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Projβ¦β277Updated last year
- β519Updated 2 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.β516Updated 2 years ago
- An script to perform kerberos bruteforcing by using impacketβ444Updated 3 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.β219Updated last year
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurationsβ250Updated 2 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.β436Updated 3 years ago
- β334Updated 2 years ago
- LDAP library for auditing MS ADβ416Updated last month
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacketβ529Updated 2 years ago
- Overlord - Red Teaming Infrastructure Automationβ617Updated 10 months ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queriesβ375Updated 4 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalationsβ356Updated 4 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkitβ434Updated last year
- Lookup for interesting stuff in SMB sharesβ149Updated last year
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.β264Updated 11 months ago
- Maximizing BloodHound. Max is a good boy.β512Updated 2 months ago
- Red Team C2 Infrastructure built in AWS using Ansible!β228Updated 4 years ago
- linikatz is a tool to attack AD on UNIXβ552Updated last year
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating systemβ201Updated last year
- Credentials gathering tool automating remote procdump and parse of lsass process.β763Updated 4 years ago