sensepost / assless-chaps
Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes
☆133Updated last year
Alternatives and similar repositories for assless-chaps:
Users that are interested in assless-chaps are comparing it to the libraries listed below
- ☆135Updated last year
- ☆186Updated last year
- ☆121Updated last year
- ☆206Updated 3 years ago
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- ADCS abuser☆277Updated 2 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆240Updated 3 years ago
- Modular Enumeration and Password Spraying Framework☆116Updated 11 months ago
- Roast in the Middle☆290Updated 4 months ago
- Koppeling x Metatwin x LazySign☆209Updated 3 years ago
- Bypassing AppLocker with C#☆138Updated 3 years ago
- Identifies the bytes that Microsoft Defender flags on.☆84Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆152Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆89Updated 10 months ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆195Updated last month
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆75Updated last year
- ☆365Updated 3 years ago
- ☆106Updated 7 months ago
- Simple rapper for Mimikatz, bypass Defender☆140Updated 3 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆228Updated 3 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆276Updated 5 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆173Updated 2 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆113Updated 4 years ago
- ☆82Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆228Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆322Updated last year
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆183Updated 3 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆166Updated 2 years ago
- ☆158Updated 4 months ago