truerustyy / wcreddumpLinks
Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with a mounted windows drive.
☆79Updated last year
Alternatives and similar repositories for wcreddump
Users that are interested in wcreddump are comparing it to the libraries listed below
Sorting:
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆57Updated 6 months ago
- Living off the land searches for explorer and sharepoint☆92Updated last month
- Source code and examples for PassiveAggression☆64Updated last year
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆94Updated 3 weeks ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆35Updated last year
- ☆52Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 2 years ago
- Tool to extract username and password of current user from PanGPA in plaintext☆88Updated last year
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated 2 weeks ago
- Microsoft Graph API post-exploitation toolkit☆95Updated last year
- ☆44Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆45Updated last year
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆66Updated 9 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆58Updated 9 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Updated 2 years ago
- ☆59Updated last year
- ☆94Updated 11 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- ☆52Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆94Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆42Updated 11 months ago
- PowerShell Reverse Shell☆79Updated 2 years ago
- A small red team course☆40Updated 2 years ago
- ☆34Updated 5 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Updated 2 years ago
- Microsoft Network Service Fingerprinting Tool☆58Updated last week
- Permanently disable EDRs as local admin☆124Updated 3 weeks ago