Identify the accounts most vulnerable to dictionary attacks
-
Updated
Apr 2, 2025 - PowerShell
Identify the accounts most vulnerable to dictionary attacks
POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interaction. It is a bypass for the CVE-2025-24054 Security Patch
Post-exploitation NTLM password hash extractor
PowerShell script to audit NTLM authentication events from Windows Security and NTLM Operational logs. Filters by NTLMv1/v2, failed logons, privileged sessions (4672), date ranges, and null sessions. Validates NTLM audit GPO settings. Targets localhost, remote servers, domain controllers, or an entire AD forest.
Uses PowerShell to convert a given string to its NT hash equivalent.
Generating MD4 and NT/NTLM Hashes in Powershell
NTLM hash calculator (MD4) for security testing and validation
Add a description, image, and links to the ntlm topic page so that developers can more easily learn about it.
To associate your repository with the ntlm topic, visit your repo's landing page and select "manage topics."