scipag / nac_bypassView external linksLinks
Script collection to bypass Network Access Control (NAC, 802.1x)
☆331Jan 17, 2026Updated 3 weeks ago
Alternatives and similar repositories for nac_bypass
Users that are interested in nac_bypass are comparing it to the libraries listed below
Sorting:
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆268Jun 13, 2023Updated 2 years ago
- This is a bash script to bypass 802.1x NAC☆100Mar 16, 2023Updated 2 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 4 months ago
- NTLM relaying for Windows made easy☆579Apr 25, 2023Updated 2 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆125Apr 9, 2022Updated 3 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,256Dec 9, 2025Updated 2 months ago
- A tool for pointesters to find candies in SharePoint☆278Nov 4, 2022Updated 3 years ago
- ☆199Jan 30, 2026Updated 2 weeks ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Jul 29, 2021Updated 4 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆326Nov 6, 2022Updated 3 years ago
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆538Sep 18, 2022Updated 3 years ago
- locate and attack Lync/Skype for Business☆346Oct 1, 2024Updated last year
- A C# utility for interacting with SCCM☆682Aug 20, 2025Updated 5 months ago
- Framework for Kerberos relaying☆939May 29, 2022Updated 3 years ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆532Nov 19, 2024Updated last year
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Oct 26, 2022Updated 3 years ago
- ☆827Sep 9, 2022Updated 3 years ago
- Recovering NTLM hashes from Credential Guard☆374Dec 26, 2022Updated 3 years ago
- ☆319Jun 28, 2023Updated 2 years ago
- DPAPI looting remotely and locally in Python☆540Oct 7, 2025Updated 4 months ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- MS-FSRVP coercion abuse PoC☆305Dec 30, 2021Updated 4 years ago
- ☆93Aug 23, 2021Updated 4 years ago
- ACL abuse swiss-knife☆127Feb 3, 2023Updated 3 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆834Oct 29, 2025Updated 3 months ago
- Evading WinDefender ATP credential-theft☆256Dec 2, 2019Updated 6 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆647Mar 20, 2024Updated last year
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,288Feb 5, 2026Updated last week
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,526Jan 27, 2025Updated last year
- Azure JWT Token Manipulation Toolset☆711Dec 6, 2024Updated last year
- D/Invoke implementation in Nim☆103Jun 8, 2022Updated 3 years ago
- ☆413Apr 28, 2021Updated 4 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆411Mar 21, 2025Updated 10 months ago
- lateral movement techniques that can be used during red team exercises☆273Jan 13, 2020Updated 6 years ago
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆502Jan 25, 2022Updated 4 years ago