Identify the accounts most vulnerable to dictionary attacks
-
Updated
Apr 2, 2025 - PowerShell
Identify the accounts most vulnerable to dictionary attacks
POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interaction. It is a bypass for the CVE-2025-24054 Security Patch
Post-exploitation NTLM password hash extractor
Uses PowerShell to convert a given string to its NT hash equivalent.
Generating MD4 and NT/NTLM Hashes in Powershell
Add a description, image, and links to the ntlm topic page so that developers can more easily learn about it.
To associate your repository with the ntlm topic, visit your repo's landing page and select "manage topics."