sensepost / assless-chaps
Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes
☆133Updated 11 months ago
Alternatives and similar repositories for assless-chaps:
Users that are interested in assless-chaps are comparing it to the libraries listed below
- ☆136Updated last year
- ☆186Updated last year
- Modular Enumeration and Password Spraying Framework☆116Updated 11 months ago
- ☆120Updated last year
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆194Updated last month
- ☆364Updated 3 years ago
- ☆68Updated 4 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆222Updated 3 years ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆143Updated 2 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆112Updated 4 years ago
- Identifies the bytes that Microsoft Defender flags on.☆84Updated 2 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆73Updated last year
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆166Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- ADCS abuser☆275Updated 2 years ago
- Dll that can be used for side loading and other attack vector.☆201Updated 4 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆185Updated 3 years ago
- Roast in the Middle☆290Updated 3 months ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆182Updated 3 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆89Updated 10 months ago
- ☆206Updated 3 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆171Updated 2 years ago
- Bypassing AppLocker with C#☆138Updated 3 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆384Updated 11 months ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆100Updated 2 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆273Updated 4 months ago
- DPAPILAB Next Gen, script collection☆81Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆169Updated 2 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆182Updated 3 years ago