rubenformation / ms-photos_NTLM_LeakLinks
New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click
☆176Updated last month
Alternatives and similar repositories for ms-photos_NTLM_Leak
Users that are interested in ms-photos_NTLM_Leak are comparing it to the libraries listed below
Sorting:
- Inject RDPThief into memory with PowerShell.☆65Updated 11 months ago
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆144Updated last month
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆182Updated 9 months ago
- ☆151Updated 7 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆144Updated 5 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆100Updated 8 months ago
- Stage 0☆168Updated last year
- Adversary Emulation Framework☆128Updated 6 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆162Updated last month
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆69Updated 3 weeks ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆155Updated 2 months ago
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆249Updated this week
- Permanently disable EDRs as local admin☆123Updated last week
- Our Tips&Tricks☆128Updated 10 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆121Updated 6 months ago
- Malicious powershell scripts loader designed to avoid detection.☆61Updated 2 years ago
- The DCERPC only printerbug.py version☆182Updated 2 months ago
- Local SYSTEM auth trigger for relaying☆168Updated 5 months ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆98Updated last week
- ☆139Updated last month
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Updated last month
- Evasive Payload Delivery Server & C2 Redirector☆112Updated last month
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆115Updated 5 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Updated 10 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆133Updated 5 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆119Updated last year
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆95Updated 3 weeks ago
- Dynamic shellcode loader with sophisticated evasion capabilities☆274Updated 3 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated last year
- ☆94Updated 11 months ago