tools.thehacker.recipes
Open in
urlscan Pro
172.64.147.209
Public Scan
Submitted URL: http://tools.thehacker.recipes/
Effective URL: https://tools.thehacker.recipes/
Submission: On June 28 via api from US — Scanned from ES
Effective URL: https://tools.thehacker.recipes/
Submission: On June 28 via api from US — Scanned from ES
Form analysis
0 forms found in the DOMText Content
THE HACKER TOOLS GitHub Twitter The Hacker Recipes SearchCtrl + K * Introduction * Mimikatz 🥝 * General 🛠️ * Modules * crypto * capi * certificates * certtohw * cng * extract * hash * keys * kutil 🛠️ * providers * sc * scauth 🛠️ * stores * system * tpminfo * dpapi * blob * cache * capi * chrome * cloudapkd 🛠️ * cloudapreg * cng * create 🛠️ * cred * credhist * luna * masterkey * protect * ps * rdg * sccm * ssh * tpm * vault * wifi * wwan * event * clear * drop * kerberos * ask * clist * golden * hash * list * ptc * ptt * purge * tgt * lsadump * backupkeys * cache * changentlm * dcshadow * dcsync * mbc * netsync * lsa * packages * postzerologon * rpdata * sam * secrets * setntlm * trust * zerologon * misc * aadcookie * clip * compress * cmd * detours * easyntlmchall * efs * lock * memssp * mflt * ncroutemon * ngcsign * printnightmare * regedit * sccm * shadowcopies * skeleton * spooler * taskmgr * wp * xor * net * alias * deleg * group * if * serverinfo * session * share * stats * tod * trust * user * wsession * privilege * backup * debug * driver * id * name * restore * security * sysenv * tcb * process * exports * imports * list * resume * run * runp * start * stop * suspend * rpc * close * connect * enum * server * sekurlsa * backupkeys * bootkey * cloudap * credman * dpapi * dpapisystem * ekeys * kerberos * krbtgt * livessp * logonpasswords * minidump * msv * process * pth * ssp * tickets * trust * tspkg * wdigest * service * - * + * preshutdown * remove * resume * shutdown * start * stop * suspend * sid * add * clear * lookup * modify * patch * query * standard * answer * base64 * cd * cls * coffee * exit * hostname * localtime * log * sleep * version * token * elevate * list * revert * run * whoami * ts * logonpasswords * mstsc * multirdp * remote * sessions * vault * cred * list * 🛠️Impacket * Library * SMB * LDAP * MSRPC * NTLM * Kerberos * Script examples * addcomputer.py * atexec.py * dcomexec.py * dpapi.py * esentutl.py * exchanger.py * findDelegation.py * GetADUsers.py * getArch.py * Get-GPPPassword.py * GetNPUsers.py * getPac.py * getST.py * getTGT.py * GetUserSPNs.py * goldenPac.py * karmaSMB.py * kintercept.py * lookupsid.py * mimikatz.py * mqtt_check.py * mssqlclient.py * mssqlinstance.py * netview.py * nmapAnswerMachine.py * ntfs-read.py * ntlmrelayx.py * ping.py * ping6.py * psexec.py * raiseChild.py * rdp_check.py * reg.py * registry-read.py * rpcdump.py * rpcmap.py * sambaPipe.py * samrdump.py * secretsdump.py * services.py * smbclient.py * smbexec.py * smbpasswd.py * smbrelayx.py * smbserver.py * sniff.py * sniffer.py * split.py * ticketConverter.py * ticketer.py * wmiexec.py * wmipersist.py * wmiquery.py * CrackMapExec * BloodHound * Rubeus * Exegol * PowerSploit * Hashcat * for Active Directory * Official docs Powered by GitBook INTRODUCTION This project is part of The Hacker Recipes and is a work in progress. I started it in 2021 and have absolutely no idea when this could be finished (will it ever be?). The Hacker Tools is focused on documenting and giving tips & tricks on common infosec tools The 🛠️ emoji is used where work has to be done. This project is aimed at providing technical guides on various hacking tools. Keep in mind that these guides are maintained by non-omniscient security enthusiasts in their spare time. You will probably find things missing or mistakes. 📣 Please feel free to contribute, give feedback/suggestions or reach out to me on Twitter (@_nwodtuhs), Discord (Shutdown#2539), IRL or whatever you feel appropriate. Almost every tool mentioned in theses notes is installed, and sometimes pre-configured, in Exegol, another project of mine of a docker environment ready to hack on day-to-day engagements. It's not much but I use it on all my engagements. Feel free to use it, to contribute, to give feedback etc. NextMimikatz 🥝 Last updated 9 months ago On this page