tobiohlala / NTLMXView external linksLinks
Post-exploitation NTLM password hash extractor
☆19Apr 7, 2021Updated 4 years ago
Alternatives and similar repositories for NTLMX
Users that are interested in NTLMX are comparing it to the libraries listed below
Sorting:
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- ☆11Oct 24, 2022Updated 3 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Dec 29, 2016Updated 9 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- XSS Fuzz Swiss Knife on any URI☆15Aug 3, 2019Updated 6 years ago
- Active Directory Toolkit☆20Apr 9, 2019Updated 6 years ago
- Reverse Shell for Android☆24Apr 12, 2014Updated 11 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- A Simple Password Protected Back Door written in Python3☆21Jul 1, 2023Updated 2 years ago
- A Golang implant that uses Slack as a command and control server☆47Jun 10, 2020Updated 5 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- Fast website scraper and wordlist generator☆82May 6, 2025Updated 9 months ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.☆25Apr 1, 2020Updated 5 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Jun 2, 2018Updated 7 years ago
- ☆24Jun 29, 2020Updated 5 years ago
- Password manager credential recovery tool☆20Feb 20, 2019Updated 6 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Provides access to libhashcat☆31Apr 6, 2024Updated last year
- This is a simple example of DLL hijacking enabling proxy execution.☆70Apr 18, 2023Updated 2 years ago
- Scrape, Hunt, and Transform names and usernames☆125Nov 19, 2022Updated 3 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆130Jan 14, 2023Updated 3 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Feb 7, 2017Updated 9 years ago
- Azure AD Identity Protection Cookie Spoofing☆35Sep 2, 2023Updated 2 years ago
- ☆37Feb 12, 2018Updated 8 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Sep 24, 2018Updated 7 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆140Jan 5, 2023Updated 3 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Sep 9, 2021Updated 4 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Oct 10, 2022Updated 3 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆34Oct 4, 2024Updated last year
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- Generate a Employee monthly payslip download as pdf and send to their mail☆10Sep 18, 2022Updated 3 years ago
- ☆14Dec 11, 2025Updated 2 months ago
- this script for fix problem vpn on kali linux "Rooling" only :)☆11Feb 17, 2017Updated 8 years ago
- ☆10Dec 3, 2021Updated 4 years ago