A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.
☆15May 13, 2021Updated 4 years ago
Alternatives and similar repositories for ntds-analyzer
Users that are interested in ntds-analyzer are comparing it to the libraries listed below
Sorting:
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 11 months ago
- Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems☆24Jun 14, 2023Updated 2 years ago
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆22Mar 31, 2019Updated 6 years ago
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated 11 months ago
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- Reworked version of https://golang.org/src/crypto/tls/generate_cert.go☆14Aug 21, 2023Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆14Mar 19, 2018Updated 7 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- MalDev & AV-EDR Evasion for Pentesters☆20Feb 17, 2023Updated 3 years ago
- BypassCredGuard CS BOF☆51Jan 23, 2025Updated last year
- NTP command & control☆18Oct 14, 2020Updated 5 years ago
- Exploits written while preparing for the OSED exam☆25Apr 30, 2024Updated last year
- Remap ntdll.dll using only NTAPI functions with a suspended process☆27Apr 13, 2025Updated 10 months ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆50Mar 2, 2022Updated 4 years ago
- Comprehensive parsing script for grepable Nmap output files. Provides a summary table, split hosts files, and URLs for web and SMB hosts.☆20Apr 17, 2020Updated 5 years ago
- All Apprentice and Practitioner-level Portswigger labs☆32May 18, 2023Updated 2 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Dec 11, 2020Updated 5 years ago
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆69Oct 31, 2021Updated 4 years ago
- Tool to perform lateral movement between AAD joined devices☆65Jun 8, 2022Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- An opensource Prank Startup Malware for windows developed using C Programming Language.☆24Aug 10, 2020Updated 5 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- A lightweight ducky script generator written in python.☆36Feb 6, 2021Updated 5 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- API hooking and code injection made easy!☆40Aug 22, 2023Updated 2 years ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated last month
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Dec 10, 2022Updated 3 years ago
- Antivirus Emulator Fingerprints☆30Oct 12, 2018Updated 7 years ago
- ☆38Feb 26, 2025Updated last year
- Tool for extracting credentials locally stored by web browsers☆37Jun 25, 2022Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆95Jul 28, 2024Updated last year
- A command line tic-tac-toe game in Golang☆12Oct 14, 2024Updated last year
- TRC20 Token and smart contracts.☆10Sep 28, 2021Updated 4 years ago