Internal-Monologue
Hash extraction toolkit
This project provides tools and techniques to retrieve NTLM hashes without directly accessing the LSASS process memory.
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
1k stars
57 watching
241 forks
Language: C#
last commit: over 6 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| Tools for implementing various hash algorithms in multiple programming languages. | 87 |
| A collection of hash functions implemented in pure Nim | 8 |
| Extracts hashes from MongoDB databases in SCRAM-SHA-1 or SCRAM-SHA-256 format for use with hashcat | 7 |
| A tool to parse NTLM challenge messages from HTTP, SMB, or MSSQL endpoints and extract information about the target system. | 143 |
| Converts NTLM hashes to HashCat format | 33 |
| An Ada interface to BLAS for linear algebra operations on dense matrices and vectors | 4 |
| Extracts password data from KeePass 2.x databases directly from memory | 1,002 |
| An implementation of a widely used authenticated encryption algorithm | 8 |
| Extracts password information from 7z archives to crack with hashcat | 359 |
| A software component providing an Android/Kotlin binding for the Argon2 password hash algorithm. | 81 |
| A PowerShell-based toolkit for obtaining Silver Tickets by exploiting weak NTLM authentication mechanisms on older Windows networks | 777 |
| Generates Apache style MD5 hash from a password and salt. | 5 |
| Provides a unified set of libraries and interfaces for password hashing in Dart applications. | 18 |
| Provides forward compatibility with PHP password_* functions from version 5.3.7 and above | 2,147 |
| Library that optimizes password hashing with the Argon2 algorithm | 20 |