No announcement yet.


  • Filter
  • Time
  • Show
Clear All
new posts

  • NTLM_Theft

    Hey Penetration Testers,

    I believe you might like this: NTLM_Theft

    "A tool for generating multiple types of NTLMv2 hash theft files.

    ntlm_theft is an Open Source Python3 Tool that generates 18 different types of hash theft documents. These can be used for phishing when either the target allows smb traffic outside their network, or if you are already inside the internal network.

    The benefits of these file types over say macro based documents or exploit documents are that all of these are built using "intended functionality". None were flagged by Windows Defender Antivirus on June 2020, and 14 of the 18 attacks worked on a fully patched Windows 10 host."

    Never used it myself (I'm not a PT) but I know that you like to steal those hashes with responder mr 7MS.

  • #2
    Yeah I saw a tweet about this - it looks cool! I've got an internal I'm starting soon. Gonna check it out.
    Brian Johnson
    7 Minute Security
    Podcaster | Security Consultant