Script collection to bypass Network Access Control (NAC, 802.1x)
☆345Feb 21, 2026Updated 2 weeks ago
Alternatives and similar repositories for nac_bypass
Users that are interested in nac_bypass are comparing it to the libraries listed below
Sorting:
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆270Jun 13, 2023Updated 2 years ago
- This is a bash script to bypass 802.1x NAC☆100Mar 16, 2023Updated 2 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 5 months ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆125Apr 9, 2022Updated 3 years ago
- A tool for pointesters to find candies in SharePoint☆281Nov 4, 2022Updated 3 years ago
- NTLM relaying for Windows made easy☆579Apr 25, 2023Updated 2 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,266Dec 9, 2025Updated 3 months ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆326Nov 6, 2022Updated 3 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- Recovering NTLM hashes from Credential Guard☆377Dec 26, 2022Updated 3 years ago
- ☆198Feb 27, 2026Updated last week
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Oct 26, 2022Updated 3 years ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 2 years ago
- A C# utility for interacting with SCCM☆682Aug 20, 2025Updated 6 months ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Jul 29, 2021Updated 4 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- Check for LDAP protections regarding the relay of NTLM authentication☆530Nov 19, 2024Updated last year
- ☆92Aug 23, 2021Updated 4 years ago
- Framework for Kerberos relaying☆937May 29, 2022Updated 3 years ago
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆537Sep 18, 2022Updated 3 years ago
- ACL abuse swiss-knife☆127Feb 3, 2023Updated 3 years ago
- ☆319Jun 28, 2023Updated 2 years ago
- ☆831Sep 9, 2022Updated 3 years ago
- locate and attack Lync/Skype for Business☆345Oct 1, 2024Updated last year
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- DPAPI looting remotely and locally in Python☆542Oct 7, 2025Updated 5 months ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,303Updated this week
- Dump NTDS with golden certificates and UnPAC the hash☆647Mar 20, 2024Updated last year
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆837Oct 29, 2025Updated 4 months ago
- ☆155Dec 14, 2023Updated 2 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆412Mar 21, 2025Updated 11 months ago
- ☆418Apr 28, 2021Updated 4 years ago
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆181Apr 23, 2021Updated 4 years ago
- Beacon Object File & C# project to check LDAP signing☆199Aug 7, 2024Updated last year
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆500Jan 25, 2022Updated 4 years ago