sinnaj-r / NTLMssp-ExtractLinks
A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.
☆25Updated 2 years ago
Alternatives and similar repositories for NTLMssp-Extract
Users that are interested in NTLMssp-Extract are comparing it to the libraries listed below
Sorting:
- IOXIDResolver from AirBus Security/PingCastle☆51Updated 4 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆62Updated 3 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆54Updated 3 years ago
- c# reverse shell poc☆27Updated 6 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- ☆23Updated 3 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆14Updated 5 years ago
- ☆41Updated 2 years ago
- Secretsdump C# version only supporting local (live) operation☆49Updated last month
- ☆30Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated last month
- ☆16Updated 3 years ago
- Zoom Persistence Aggressor and Handler☆55Updated 4 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆26Updated 6 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆23Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- My BloodHound custom queries☆23Updated 2 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆37Updated 6 years ago
- ☆35Updated 4 years ago
- Modified version of Pypykatz to print encrypted credentials☆51Updated 2 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- Pwnage☆16Updated 3 months ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆27Updated 10 months ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Updated 3 years ago
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆26Updated last year
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆40Updated 4 years ago