scipag / nac_bypassLinks
Script collection to bypass Network Access Control (NAC, 802.1x)
☆316Updated 2 months ago
Alternatives and similar repositories for nac_bypass
Users that are interested in nac_bypass are comparing it to the libraries listed below
Sorting:
- ☆190Updated 2 years ago
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆318Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆234Updated 3 years ago
- LDAP library for auditing MS AD☆450Updated last month
- Kerberoast attack -pure python-☆438Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 3 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆375Updated last year
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆145Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆333Updated 8 months ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆259Updated 2 years ago
- ☆199Updated 5 years ago
- scan for NTLM directories☆364Updated last month
- Maximizing BloodHound. Max is a good boy.☆520Updated 2 months ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆230Updated 2 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆303Updated 2 years ago
- Dumping LAPS from Python☆274Updated 2 years ago
- Password spraying tool and Bloodhound integration☆238Updated 6 months ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆200Updated 2 months ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆189Updated 5 years ago
- Roast in the Middle☆292Updated 7 months ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆264Updated last year
- A tool to query for the existence of pre-windows 2000 computer objects.☆338Updated last month
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆251Updated 3 months ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆396Updated 3 months ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆393Updated last year
- Inject remote template link into word document for remote template injection☆179Updated 4 years ago
- Infrastructure Automation☆350Updated last year
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆258Updated 3 years ago
- Chameleon: A tool for evading Proxy categorisation☆501Updated 7 months ago
- Python script that performs email address validation against Office 365 without submitting login attempts.☆352Updated 4 years ago