Have you ever been on an internal network assessment and discovered an unauthenticated writable Windows-based file share? In addition to finding potentially sensitive information, you can abuse this to gather user hashes from users who are browsing the file share. In this attack, a special file with a SCF file extension is placed onto the file share. SCF files can control Windows Explorer, but in this case, we use one to elicit an unsuspecting user to submit their NTLMv1/2 hash to us, the attacker.
FEATURES
SIMILAR TOOLS
A technique for social engineering and untrusted command execution using ClickOnce technology
A scripting engine for interacting with GraphQL endpoints for pentesting purposes.
A tool for performing hash length extension attacks against multiple hashing algorithms.
LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.
A tool that visits suspected phishing pages, takes screenshots, and extracts interesting files.
A wargaming network for penetration testers to practice their skills in a realistic environment.
Tool for exploiting Sixnet RTUs to gain root level access with little effort.
A collection of scripts for Turbo Intruder, a penetration testing tool
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.