Script collection to bypass Network Access Control (NAC, 802.1x)
☆363Feb 21, 2026Updated 2 months ago
Alternatives and similar repositories for nac_bypass
Users that are interested in nac_bypass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a bash script to bypass 802.1x NAC☆101Mar 16, 2023Updated 3 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆273Jun 13, 2023Updated 2 years ago
- A tool for pointesters to find candies in SharePoint☆283Nov 4, 2022Updated 3 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,278Apr 23, 2026Updated last week
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆508Sep 23, 2025Updated 7 months ago
- ACL abuse swiss-knife☆129Feb 3, 2023Updated 3 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 3 years ago
- A C# utility for interacting with SCCM☆690Mar 30, 2026Updated last month
- Recovering NTLM hashes from Credential Guard☆384Dec 26, 2022Updated 3 years ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆188Jun 22, 2022Updated 3 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆327Nov 6, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆543Sep 18, 2022Updated 3 years ago
- ☆320Jun 28, 2023Updated 2 years ago
- ☆836Sep 9, 2022Updated 3 years ago
- Framework for Kerberos relaying☆947May 29, 2022Updated 3 years ago
- ☆202Feb 27, 2026Updated 2 months ago
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- ☆93Aug 23, 2021Updated 4 years ago
- DPAPI looting remotely and locally in Python☆549Mar 13, 2026Updated last month
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- locate and attack Lync/Skype for Business☆345Oct 1, 2024Updated last year
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆124Apr 9, 2022Updated 4 years ago
- The swiss army knife of LSASS dumping☆2,094Sep 17, 2024Updated last year
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,589Mar 11, 2026Updated last month
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated 2 years ago
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,337Apr 24, 2026Updated last week
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,145Jun 10, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆303Oct 26, 2022Updated 3 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 7 months ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,812Feb 27, 2026Updated 2 months ago
- Azure JWT Token Manipulation Toolset☆730Dec 6, 2024Updated last year
- ☆538Nov 20, 2021Updated 4 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆648Mar 20, 2024Updated 2 years ago
- ☆158Dec 14, 2023Updated 2 years ago