NTLMv1 Multitool
NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The following binary network packet capture formats are supported: ...
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
翻译 - Jacob Wilkin(Greenwolf)生成多种类型的NTLMv2哈希盗窃文件的工具
ntlm relay attack to Exchange Web Services
An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).
Enumerate information from NTLM authentication enabled web endpoints 🔎
翻译 - 快速灵活的NTLM侦察工具
NTLM authentication support for Requests.
SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket
NTLM/Negotiate authentication over HTTP
poison and relay NTLM credentials
Recovering NTLM hashes from Credential Guard
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
Parse NTLM challenge messages over HTTP and SMB
翻译 - 通过HTTP质询消息解析NTLM
An HTTP proxy server to automatically authenticate through an NTLM proxy
Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!
Windows privilege escalation through NTLM Relay and NBNS Spoofing
Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS
Red Team oriented C# Simple HTTP & WebDAV Server with Net-NTLM hashes capture functionality
翻译 - 具有Net-NTLM哈希捕获功能的面向Red Team的C#简单HTTP和WebDAV服务器