A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and indirect NTAPIs for core operations.
-
Updated
Dec 15, 2024 - Rust
A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and indirect NTAPIs for core operations.
Identify the accounts most vulnerable to dictionary attacks
Having the NTLM and a cracked LM hash it is possible to get the original password by testing all the combinations of upper and lowercases. This is useful if a ntds.dit file has both NTLM and LM hashes
Active Directory Post Exploitation
A Python script that queries the Weakpass API to attempt cracking various types of password hashes (NTLM, MD5, SHA1, SHA256). This tool is particularly helpful for cracking NTLM hashes obtained via DCSync in a Windows Domain environment, though it supports several other hash types as well.
Script to crack the SAM file --- NTLM hash comparison
Add a description, image, and links to the ntlm-hash topic page so that developers can more easily learn about it.
To associate your repository with the ntlm-hash topic, visit your repo's landing page and select "manage topics."