sensepost / assless-chapsLinks
Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes
☆136Updated last year
Alternatives and similar repositories for assless-chaps
Users that are interested in assless-chaps are comparing it to the libraries listed below
Sorting:
- ☆142Updated 2 years ago
- ☆191Updated 2 years ago
- ☆122Updated 2 years ago
- Offensive tool to trigger network authentications as SYSTEM☆143Updated 4 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆99Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆189Updated 2 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆258Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- ☆209Updated 3 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆217Updated last month
- Modular Enumeration and Password Spraying Framework☆128Updated last year
- Koppeling x Metatwin x LazySign☆215Updated 4 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆200Updated 4 months ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆131Updated 4 years ago
- ☆129Updated 2 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆230Updated 4 years ago
- ☆223Updated 2 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- ☆108Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- ☆10Updated 4 years ago
- Some scripts to support with importing large datasets into BloodHound☆81Updated 2 years ago
- Roast in the Middle☆293Updated 2 months ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆247Updated 4 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆122Updated 3 years ago
- Identifies the bytes that Microsoft Defender flags on.☆97Updated 3 years ago
- Bypassing AppLocker with C#☆143Updated 4 years ago
- A prototype malware C2 channel using x509 certificates over mTLS☆151Updated last year
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆184Updated 2 years ago
- Simple APPLocker bypass summary☆47Updated 7 years ago