sensepost / ntcrackLinks
Left To My Own Devices - NT hash tools
☆41Updated 3 years ago
Alternatives and similar repositories for ntcrack
Users that are interested in ntcrack are comparing it to the libraries listed below
Sorting:
- Python Script for SAML2 Authentication Passwordspray☆42Updated 2 years ago
- ☆54Updated 4 years ago
- Modified version of PEAS client for offensive operations☆43Updated 2 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆50Updated 2 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Updated 2 years ago
- ☆53Updated 2 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Updated 5 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated 3 months ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Updated 4 years ago
- visually see issues with supported cipher suites☆17Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 4 years ago
- PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10…☆35Updated 3 years ago
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆60Updated 2 years ago
- A VS Code extension to preview XML nmap output☆44Updated 9 months ago
- Random scripts for azure stuff☆12Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 4 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆106Updated 6 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- Password Spraying Framework☆63Updated 3 years ago
- ☆43Updated 3 years ago
- PAM Backdoor☆33Updated 2 years ago
- Top hashpwn rules☆21Updated last year
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Updated 2 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆29Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- Quick and dirty PoSH code to read teams messages☆23Updated 10 months ago