zer1t0 / ntlm-info
Retrieve host information from NTLM
☆27Updated 4 years ago
Alternatives and similar repositories for ntlm-info:
Users that are interested in ntlm-info are comparing it to the libraries listed below
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆62Updated 3 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- ☆48Updated 2 years ago
- My BloodHound custom queries☆23Updated 2 years ago
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆51Updated 2 years ago
- Some of my custom "tools".☆23Updated 3 years ago
- ☆30Updated 2 years ago
- ☆25Updated 3 years ago
- load dumped csharp binaries as assemblies and launch them in memory☆26Updated last year
- Rust implementation of the Process Herpaderping☆24Updated last year
- LSASS enumeration like pypykatz written in C-Lang☆20Updated 3 years ago
- Validates priv escalation of AD trusts☆39Updated 3 weeks ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- A BOF port of the research of @thefLinkk and @codewhitesec☆96Updated 3 years ago
- Modified version of Pypykatz to print encrypted credentials☆51Updated 2 years ago
- Donut generator in rust.☆26Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- IOXIDResolver from AirBus Security/PingCastle☆50Updated 4 years ago
- A LAPS dumper written using the impacket library.☆31Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆40Updated last month
- ☆29Updated 2 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆55Updated 3 years ago
- Tool to aid in dumping LSASS process remotely☆38Updated 8 months ago
- ☆19Updated last year
- Example of using Sleep to create better named pipes.☆41Updated last year
- A BOF for lazy people☆17Updated last year
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year