vletoux / DetectPasswordViaNTLMInFlow
Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test passwords
☆58Updated 5 years ago
Alternatives and similar repositories for DetectPasswordViaNTLMInFlow:
Users that are interested in DetectPasswordViaNTLMInFlow are comparing it to the libraries listed below
- ☆24Updated 6 years ago
- ☆26Updated 6 years ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆25Updated 6 years ago
- ☆70Updated 6 years ago
- ☆21Updated 6 years ago
- ☆75Updated 6 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆41Updated 6 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆53Updated 5 years ago
- ☆38Updated 6 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Updated 5 years ago
- Run Managed Assemblies with RunDll☆16Updated 6 years ago
- ☆52Updated 5 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆60Updated 6 years ago
- .NET tool for enumeration processes and dumping memory.☆56Updated 5 years ago
- ☆45Updated 6 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Updated 5 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆61Updated 7 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆61Updated 6 years ago
- Microsoft Applocker evasion tool☆38Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆74Updated 4 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆44Updated 7 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆55Updated 5 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆34Updated 5 years ago
- ☆39Updated 6 years ago
- ☆20Updated 6 years ago
- My musings with C#☆28Updated 2 years ago
- Protect your servers with a secret header☆28Updated 4 years ago
- ☆93Updated 6 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆31Updated 8 years ago
- ☆37Updated 5 years ago