sensepost / assless-chaps
Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes
☆127Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for assless-chaps
- ☆133Updated last year
- ☆180Updated last year
- ADCS abuser☆257Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆75Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆216Updated 2 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆378Updated 7 months ago
- Koppeling x Metatwin x LazySign☆203Updated 3 years ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆143Updated 2 years ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆198Updated 11 months ago
- ☆66Updated 4 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆268Updated 3 weeks ago
- ☆351Updated 3 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆180Updated 3 years ago
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆135Updated 2 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆163Updated 2 years ago
- PowerShell Constrained Language Mode Bypass☆232Updated 3 years ago
- Roast in the Middle☆269Updated this week
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆232Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆149Updated last year
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆182Updated 3 years ago
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆225Updated 4 years ago
- ☆118Updated last year
- Offensive tool to trigger network authentications as SYSTEM☆138Updated 2 years ago
- Inject remote template link into word document for remote template injection☆163Updated 3 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆110Updated 4 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆249Updated 2 years ago
- ☆161Updated last year
- Simple rapper for Mimikatz, bypass Defender☆139Updated 3 years ago
- ☆198Updated last year