Script collection to bypass Network Access Control (NAC, 802.1x)
☆360Feb 21, 2026Updated last month
Alternatives and similar repositories for nac_bypass
Users that are interested in nac_bypass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a bash script to bypass 802.1x NAC☆101Mar 16, 2023Updated 3 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆273Jun 13, 2023Updated 2 years ago
- A tool for pointesters to find candies in SharePoint☆282Nov 4, 2022Updated 3 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,275Dec 9, 2025Updated 4 months ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 6 months ago
- ACL abuse swiss-knife☆127Feb 3, 2023Updated 3 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- A C# utility for interacting with SCCM☆687Mar 30, 2026Updated last week
- Recovering NTLM hashes from Credential Guard☆379Dec 26, 2022Updated 3 years ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆327Nov 6, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆541Sep 18, 2022Updated 3 years ago
- ☆320Jun 28, 2023Updated 2 years ago
- Framework for Kerberos relaying☆943May 29, 2022Updated 3 years ago
- ☆834Sep 9, 2022Updated 3 years ago
- ☆202Feb 27, 2026Updated last month
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- ☆93Aug 23, 2021Updated 4 years ago
- DPAPI looting remotely and locally in Python☆545Mar 13, 2026Updated 3 weeks ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- locate and attack Lync/Skype for Business☆345Oct 1, 2024Updated last year
- The swiss army knife of LSASS dumping☆2,086Sep 17, 2024Updated last year
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆124Apr 9, 2022Updated 4 years ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,564Mar 11, 2026Updated last month
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,320Updated this week
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,126Jun 10, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆303Oct 26, 2022Updated 3 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 6 months ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,773Feb 27, 2026Updated last month
- Azure JWT Token Manipulation Toolset☆727Dec 6, 2024Updated last year
- ☆538Nov 20, 2021Updated 4 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆646Mar 20, 2024Updated 2 years ago
- ☆157Dec 14, 2023Updated 2 years ago