tobiohlala / NTLMX
Post-exploitation NTLM password hash extractor
☆18Updated 3 years ago
Related projects: ⓘ
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆47Updated 6 years ago
- AV/EDR evasion via direct system calls.☆32Updated 3 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆30Updated 7 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated last year
- ☆17Updated 2 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆60Updated 5 years ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆16Updated 4 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 4 years ago
- Automatically spin up infra for phishing☆64Updated 4 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆66Updated 6 years ago
- ☆16Updated 7 years ago
- Tests AD passwords while respecting Bad Password Count☆17Updated 5 years ago
- Collection of scripts and tools that I created to aid in my testing.☆13Updated 2 years ago
- RemotePSpy provides live monitoring of remote PowerShell sessions, which is particularly useful for older (pre-5.0) versions of PowerShel…☆18Updated 4 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆16Updated 3 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆28Updated 6 years ago
- Enumerate RIDs using pure Python☆30Updated last month
- Generates anti-sandbox analysis HTA files without payloads☆16Updated 7 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆31Updated 5 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆34Updated 4 years ago
- ☆12Updated this week
- Simple powershell script to find living off land binaries and scripts on a system.☆20Updated 5 years ago
- ☆21Updated 6 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆27Updated 3 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆27Updated 8 years ago
- Pass-thru web server for traffic redirection☆24Updated 5 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Updated 7 years ago
- ☆19Updated this week
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆9Updated 3 years ago