NTLMRawUnHide – A Python3 Script Designed To Parse Network Packet Capture Files And Extract NTLMv2 Hashes In A Crackable Format

NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The tool was developed to extract NTLMv2 hashes from files generated by native Windows binaries like NETSH.EXE and PKTMON.EXE without conversion. The following binary network packet capture formats are supported: *.pcap *.pcapng *.cap *.etl UsageRead More

ParamKit – A Small Library Helping To Parse Commandline Parameters

A small library helping to parse commandline parameters (for Windows). Objectives “like Python’s argparse but for C/C++” compact and minimalistic easy to use extendable DemoPrint help for each parameter: Easily store values of popular types, and verify if all required parameters are filled: Verify if no invalid parameter was passed: See the demo code DownloadRead More

CVE Api – Parse & filter the latest CVEs from cve.mitre.org

Parse & filter the latest CVEs from https://cve.mitre.org. Docs Usagehttp://localhost:4000/cve?target=KEYWORDThe year parameter is optional.http://localhost:4000/cve?target=KEYWORD&year=YEAR Exampleshttp://localhost:4000/cve?target=ruby%20on%20rails http://localhost:4000/cve?target=ruby%20on%20rails&year=2020If you want to parse the latest year, use the “latest” keyword.http://localhost:4000/cve?target=ruby%20on%20rails&year=latest Getting started Download the project bundle install ruby rest.rb Requirements Ruby Docker (Optional, only required if you want to run through a container.) EnvironmentYou can switch between prodRead More

X