scipag / nac_bypassLinks
Script collection to bypass Network Access Control (NAC, 802.1x)
☆319Updated 2 months ago
Alternatives and similar repositories for nac_bypass
Users that are interested in nac_bypass are comparing it to the libraries listed below
Sorting:
- Kerberoast attack -pure python-☆438Updated last year
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆319Updated 2 years ago
- ☆190Updated 2 years ago
- LDAP library for auditing MS AD☆452Updated 2 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆234Updated 3 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆335Updated 9 months ago
- Password spraying tool and Bloodhound integration☆239Updated 7 months ago
- ☆199Updated 5 years ago
- Maximizing BloodHound. Max is a good boy.☆520Updated 3 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆303Updated 2 years ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆251Updated 4 months ago
- Dumping LAPS from Python☆274Updated 2 years ago
- Python script that performs email address validation against Office 365 without submitting login attempts.☆357Updated 4 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆202Updated 2 months ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆397Updated 4 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆494Updated 2 years ago
- scan for NTLM directories☆364Updated 2 months ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆395Updated last year
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆260Updated 2 years ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆145Updated 2 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆382Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 3 years ago
- In-depth ldap enumeration utility☆497Updated 2 weeks ago
- Chameleon: A tool for evading Proxy categorisation☆501Updated 8 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆490Updated last year
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆129Updated 2 years ago
- Roast in the Middle☆292Updated 8 months ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆267Updated last year
- A tool to query for the existence of pre-windows 2000 computer objects.☆344Updated 2 months ago
- Inject remote template link into word document for remote template injection☆179Updated 4 years ago