rubenformation / ms-photos_NTLM_LeakLinks
New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click
☆183Updated 2 months ago
Alternatives and similar repositories for ms-photos_NTLM_Leak
Users that are interested in ms-photos_NTLM_Leak are comparing it to the libraries listed below
Sorting:
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆183Updated 10 months ago
- Adversary Emulation Framework☆129Updated 6 months ago
- Inject RDPThief into memory with PowerShell.☆65Updated last year
- ☆157Updated 8 months ago
- Shellcode injection using the Windows Debugging API☆160Updated 2 weeks ago
- Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.☆189Updated 2 weeks ago
- Stage 0☆169Updated last year
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆147Updated last month
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆132Updated 2 weeks ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆101Updated 8 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆145Updated 6 months ago
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆250Updated last week
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆164Updated 5 months ago
- Advanced Windows authentication token extraction and decryption tool for red team operations and security research☆76Updated 3 weeks ago
- Permanently disable EDRs as local admin☆124Updated last month
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆163Updated 2 months ago
- Dynamic shellcode loader with sophisticated evasion capabilities☆277Updated 3 months ago
- ☆94Updated last year
- Malicious powershell scripts loader designed to avoid detection.☆61Updated 2 years ago
- Our Tips&Tricks☆128Updated 11 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155Updated last year
- Proof of concept for Kerberos Armoring abuse.☆58Updated last month
- Remote DLL Injection with Timer-based Shellcode Execution☆152Updated 6 months ago
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆216Updated last week
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆122Updated 7 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated last year
- Evasive Payload Delivery Server & C2 Redirector☆112Updated 2 months ago
- The DCERPC only printerbug.py version☆187Updated 2 months ago
- Python tool to automatically perform SPN-less RBCD attacks.☆99Updated 2 weeks ago
- PowerShell script to generate ShellCode in various formats☆46Updated last year