ulodciv / httpx-ntlmLinks
NTLM authentication support for HTTPX.
☆13Updated last year
Alternatives and similar repositories for httpx-ntlm
Users that are interested in httpx-ntlm are comparing it to the libraries listed below
Sorting:
- SSDP Service Discovery☆17Updated 6 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 3 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Updated 6 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- Hacky linux memory probe. Yara or Regex scan process memory☆11Updated last month
- Silent Cleanup UAC Bypass POC☆11Updated 5 years ago
- leaking net-ntlm with webdav☆25Updated 4 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- POC code to crash Windows Event Logger Service☆27Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- ☆13Updated 5 years ago
- ☆16Updated 5 years ago
- Event Data Collector☆38Updated last week
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆19Updated 6 years ago
- Apfell implant written in C#.☆8Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆18Updated 7 years ago
- ☆17Updated 5 years ago
- ☆21Updated 5 years ago
- Red Team C2 and Post Exploitation code☆36Updated last week
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Showing how proof-of-work can be used to evade antivirus emulators.☆11Updated 7 months ago
- Leak windows system info through a docx file☆12Updated 5 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆23Updated 4 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Updated 4 years ago
- Automation Capable Multi Search 64 Bit Windows Memory Scanner☆28Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- interesting analysis☆16Updated 7 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago