sensepost / assless-chapsLinks
Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes
☆135Updated last year
Alternatives and similar repositories for assless-chaps
Users that are interested in assless-chaps are comparing it to the libraries listed below
Sorting:
- ☆140Updated last year
- ☆190Updated 2 years ago
- Offensive tool to trigger network authentications as SYSTEM☆142Updated 3 years ago
- Some scripts to support with importing large datasets into BloodHound☆81Updated last year
- ☆129Updated 2 years ago
- ☆123Updated last year
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆178Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆96Updated last year
- Modular Enumeration and Password Spraying Framework☆122Updated last year
- ☆209Updated 3 years ago
- Quick and dirty dynamic redirect.rules generator☆164Updated 2 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆191Updated 4 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆187Updated 4 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆229Updated 4 years ago
- Koppeling x Metatwin x LazySign☆214Updated 4 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆179Updated 2 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆79Updated last year
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆259Updated 3 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆190Updated 4 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆123Updated 5 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆87Updated 2 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆188Updated 3 weeks ago
- LDAP Querying without the Suck☆110Updated 9 months ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆130Updated 3 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆120Updated 3 years ago
- Remotely enables Restricted Admin Mode☆211Updated 3 years ago
- ☆108Updated last year
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆243Updated 4 years ago
- Buggy script to play with GPOs☆115Updated 8 months ago