
Practical Guide to NTLM Relaying in 2017
#Security Testing#Offensive Security
FOCA is a tool used to find metadata and hidden information in scanned documents, with capabilities to analyze various file types and extract EXIF information.
This blog post provides a
This blog post provides a practical guide on NTLM relaying, aiming to clear up confusion and offer an up-to-date approach to utilizing hashes obtained with Responder for Active Directory attacks
It addresses the differences between
It addresses the differences between NTLM, NTLMv1/v2, and Net-NTLMv1/v2, ensuring clarity for readers.
Other AI Tools

RTFSig
A simple JWT token brute force cracker
Details
Visit site

Reversing With Lena (Tutorials)
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
Details
Visit site

Rootkit Hunter
Define and validate YARA rule metadata with CCCS YARA Specification.
Details
Visit site

ROPgadget Tool
A Scriptable Android Debugger for reverse engineers and developers.
Details
Visit site

Ropper
Automatic analysis of malware behavior using machine learning.
Details
Visit site

Sabotage: Code added to popular NPM package wiped files in Russia and Belarus
A dataset release policy for the Android Malware Genome Project, requiring authentication and justification for access to the dataset.
Details
Visit site