sensepost / assless-chapsLinks
Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes
☆133Updated last year
Alternatives and similar repositories for assless-chaps
Users that are interested in assless-chaps are comparing it to the libraries listed below
Sorting:
- ☆140Updated last year
- ☆123Updated last year
- ☆391Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆233Updated 3 years ago
- ☆190Updated 2 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆79Updated last year
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆145Updated 2 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆279Updated 7 months ago
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- Modular Enumeration and Password Spraying Framework☆118Updated last year
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆181Updated 2 months ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆123Updated 5 years ago
- ☆84Updated 2 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆168Updated 3 years ago
- ADCS abuser☆292Updated 2 years ago
- ☆126Updated 2 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆198Updated last month
- LittleCorporal: A C# Automated Maldoc Generator☆229Updated 3 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆186Updated 3 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆392Updated last year
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆87Updated 2 years ago
- Koppeling x Metatwin x LazySign☆213Updated 3 years ago
- ☆72Updated 3 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆95Updated last year
- ☆9Updated 3 years ago
- Offensive tool to trigger network authentications as SYSTEM☆142Updated 3 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆188Updated 3 years ago
- Bypassing AppLocker with C#☆141Updated 3 years ago
- ☆93Updated 2 years ago
- ☆208Updated 3 years ago