yanncam / ShuckNTLinks
ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication token based on Data Encryption Standard (DES).
☆72Updated 7 months ago
Alternatives and similar repositories for ShuckNT
Users that are interested in ShuckNT are comparing it to the libraries listed below
Sorting:
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆126Updated 4 months ago
- ☆117Updated 2 months ago
- ☆85Updated 4 months ago
- A Python POC for CRED1 over SOCKS5☆149Updated 7 months ago
- ☆69Updated 2 months ago
- pysnaffler☆99Updated 2 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆102Updated 7 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆177Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆147Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆114Updated 2 months ago
- Inject RDPThief into memory with PowerShell.☆64Updated 4 months ago
- ☆158Updated last year
- ☆68Updated this week
- Detect common NFS server misconfigurations☆61Updated this week
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆75Updated 6 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆54Updated 5 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆49Updated 2 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆115Updated last year
- Tool to extract username and password of current user from PanGPA in plaintext☆84Updated 5 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆142Updated last month
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 3 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆137Updated 9 months ago
- ☆133Updated 3 weeks ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆80Updated 8 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆93Updated 2 years ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆139Updated 10 months ago
- ☆61Updated 4 months ago
- D/Invoke standalone shellcode runners☆39Updated last year
- Just some random Red Team Scripts that can be useful☆152Updated 11 months ago
- ☆90Updated 3 months ago