ricardojoserf / ntds-analyzerView external linksLinks
A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.
☆15May 13, 2021Updated 4 years ago
Alternatives and similar repositories for ntds-analyzer
Users that are interested in ntds-analyzer are comparing it to the libraries listed below
Sorting:
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 10 months ago
- Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems☆23Jun 14, 2023Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63May 29, 2023Updated 2 years ago
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated 10 months ago
- EMQX Dashboard Malicious Plugin leading to RCE☆47Jun 16, 2025Updated 7 months ago
- Toolkit to investigate the BitTorrent network.☆10Dec 19, 2023Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Reworked version of https://golang.org/src/crypto/tls/generate_cert.go☆14Aug 21, 2023Updated 2 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆22Feb 17, 2024Updated last year
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆14Mar 19, 2018Updated 7 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- MalDev & AV-EDR Evasion for Pentesters☆20Feb 17, 2023Updated 2 years ago
- BypassCredGuard CS BOF☆49Jan 23, 2025Updated last year
- Dataset of packed ELF samples☆21Jan 24, 2026Updated 3 weeks ago
- NTP command & control☆18Oct 14, 2020Updated 5 years ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆27Apr 13, 2025Updated 10 months ago
- Exploits written while preparing for the OSED exam☆26Apr 30, 2024Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Mar 2, 2022Updated 3 years ago
- Collections of way to evade normal detection events.☆23Sep 13, 2020Updated 5 years ago
- Lazarus analysis tools and research report☆57Dec 22, 2023Updated 2 years ago
- Open source tool for static analysis of malwares.☆28Jul 10, 2020Updated 5 years ago
- All Apprentice and Practitioner-level Portswigger labs☆31May 18, 2023Updated 2 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- One BadUSB to rule them all using ATmega32U4☆22Nov 19, 2020Updated 5 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆69Oct 31, 2021Updated 4 years ago
- An opensource Prank Startup Malware for windows developed using C Programming Language.☆23Aug 10, 2020Updated 5 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆36Jul 22, 2021Updated 4 years ago
- A lightweight ducky script generator written in python.☆36Feb 6, 2021Updated 5 years ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆81Jan 26, 2026Updated 2 weeks ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Dec 10, 2022Updated 3 years ago
- Captive wifi hotspot bypass tool for Linux☆65Jan 17, 2019Updated 7 years ago
- Tool for extracting credentials locally stored by web browsers☆37Jun 25, 2022Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago