A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.
☆25Mar 5, 2023Updated 3 years ago
Alternatives and similar repositories for NTLMssp-Extract
Users that are interested in NTLMssp-Extract are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Sep 3, 2015Updated 10 years ago
- Get Fine Grained Password Policy☆78Mar 13, 2026Updated 2 weeks ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆27Oct 1, 2023Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- Secretsdump C# version only supporting local (live) operation☆55Apr 20, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Hooked create process injection for meterpreter☆23Jun 16, 2021Updated 4 years ago
- ☆16Feb 10, 2020Updated 6 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆33Nov 12, 2022Updated 3 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- Docker container escape enumeration tool.☆12Jan 23, 2021Updated 5 years ago
- Rusty Impersonate☆104Oct 15, 2025Updated 5 months ago
- This is a fork of the deDECTed.org project. Just making a few requested merges and changes.☆15Sep 3, 2015Updated 10 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Sep 13, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆16May 20, 2022Updated 3 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- ☆33Oct 17, 2014Updated 11 years ago
- RabbitMQ exploit and Pentesting guide for penetration tester☆20Nov 22, 2023Updated 2 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago
- pysnaffler☆110Jan 6, 2026Updated 2 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆362Dec 13, 2025Updated 3 months ago
- a minimalistic winrm client written in python☆26Mar 6, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- Reverse ip lookup tool written with go . Bing , Spyse , HackerTarget , ViewDns☆12May 14, 2022Updated 3 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆103May 6, 2024Updated last year
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- A C# tool for extracting information from SCCM PXE boot media.☆52Jan 14, 2026Updated 2 months ago
- ☆38Jan 7, 2025Updated last year
- Automated Evilginx phishlet creator Extension for Burpsuite☆65Jan 10, 2025Updated last year
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- DPAPI looting remotely and locally in Python☆543Mar 13, 2026Updated 2 weeks ago
- 「🧊」Ring 3 Rootkit for Windows 10☆60Dec 7, 2024Updated last year
- A tool to tunnel TCP traffic over WinRM☆18Jul 15, 2021Updated 4 years ago
- Just a better dirbuster☆13Dec 8, 2022Updated 3 years ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year