sensepost / ntcrackLinks
Left To My Own Devices - NT hash tools
☆40Updated 3 years ago
Alternatives and similar repositories for ntcrack
Users that are interested in ntcrack are comparing it to the libraries listed below
Sorting:
- ☆54Updated 4 years ago
- A VS Code extension to preview XML nmap output☆44Updated 10 months ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated 3 weeks ago
- ☆42Updated 8 months ago
- Python Script for SAML2 Authentication Passwordspray☆42Updated 2 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Random scripts for azure stuff☆12Updated 3 years ago
- Tools for offensive security of NetBackup infrastructures☆42Updated 2 years ago
- Modified version of PEAS client for offensive operations☆43Updated 2 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆14Updated 6 years ago
- shellcode obfuscater and runner in golang☆11Updated 2 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆106Updated 6 years ago
- visually see issues with supported cipher suites☆17Updated last year
- ☆20Updated 5 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated 5 months ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago