Internal-Monologue

Hash extraction toolkit

This project provides tools and techniques to retrieve NTLM hashes without directly accessing the LSASS process memory.

Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS

GitHub

1k stars
57 watching
241 forks
Language: C#
last commit: about 6 years ago

Related projects:

Repository Description Stars
mirage/digestif Tools for implementing various hash algorithms in multiple programming languages. 87
apense/shimsham A collection of hash functions implemented in pure Nim 8
philsmd/mongodb2hashcat Extracts hashes from MongoDB databases in SCRAM-SHA-1 or SCRAM-SHA-256 format for use with hashcat 7
nopfor/ntlm_challenger A tool to parse NTLM challenge messages from HTTP, SMB, or MSSQL endpoints and extract information about the target system. 143
ins1gn1a/netntlm-hashcat Converts NTLM hashes to HashCat format 33
jhumphry/lalg An Ada interface to BLAS for linear algebra operations on dense matrices and vectors 4
denandz/keefarce Extracts password data from KeePass 2.x databases directly from memory 1,001
jhumphry/spark_norx An implementation of a widely used authenticated encryption algorithm 8
philsmd/7z2hashcat Extracts password information from 7z archives to crack with hashcat 352
lambdapioneer/argon2kt A software component providing an Android/Kotlin binding for the Argon2 password hash algorithm. 79
notmedic/netntlmtosilverticket A PowerShell-based toolkit for obtaining Silver Tickets by exploiting weak NTLM authentication mechanisms on older Windows networks 763
bunnylushington/apache.passwdmd5 Generates Apache style MD5 hash from a password and salt. 5
tmthecoder/dargon2 Provides a unified set of libraries and interfaces for password hashing in Dart applications. 18
ircmaxell/password_compat Provides forward compatibility with PHP password_* functions from version 5.3.7 and above 2,147
jdconley/argon2themax Library that optimizes password hashing with the Argon2 algorithm 20