sensepost / ntcrackLinks
Left To My Own Devices - NT hash tools
☆33Updated 2 years ago
Alternatives and similar repositories for ntcrack
Users that are interested in ntcrack are comparing it to the libraries listed below
Sorting:
- ☆54Updated 4 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago
- ☆42Updated 3 months ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- Random scripts for azure stuff☆11Updated 2 years ago
- Python Script for SAML2 Authentication Passwordspray☆39Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆58Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- visually see issues with supported cipher suites☆16Updated last year
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- Continuous kerberoast monitor☆45Updated last year
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆58Updated 3 years ago
- PAM Backdoor☆28Updated 2 years ago
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- Basic Dart reverse shell code☆21Updated last year