Skip to content
View MzHmO's full-sized avatar
๐Ÿ•Š๏ธ
pwntesting!!!!
๐Ÿ•Š๏ธ
pwntesting!!!!

Organizations

@CICADA8-Research

Block or report MzHmO

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
MzHmO/README.md

Hello, I'm mzhmo! ๐Ÿ‘‹

Typing SVG

๐Ÿ“Š GitHub Stats

mzhmo's Stats mzhmo's Streak
mzhmo's Top Languages

๐Ÿ”ง My Tools & Research

Find more of my tools and research here:
CICADA8-Research Organization

โš ๏ธ Important Notice

ALL TOOLS AND OUR RESEARCH ARE POSTED FOR EDUCATIONAL PURPOSES ONLY. WE DO NOT APPROVE THEIR USE WITHOUT AUTHORIZATION TO CONDUCT PENTESTS.

Pinned Loading

  1. CICADA8-Research/RemoteKrbRelay CICADA8-Research/RemoteKrbRelay Public

    Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework

    C# 607 97

  2. PowershellKerberos PowershellKerberos Public

    Some scripts to abuse kerberos using Powershell

    PowerShell 343 45

  3. NtlmThief NtlmThief Public

    Extracting NetNTLM without touching lsass.exe

    C++ 239 34

  4. Parasite-Invoke Parasite-Invoke Public

    Hide your P/Invoke signatures through other people's signed assemblies

    C# 211 33

  5. TGSThief TGSThief Public

    My implementation of the GIUDA project in C++

    C++ 185 27

  6. CICADA8-Research/LogHunter CICADA8-Research/LogHunter Public

    Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)

    Python 72 15