https://github.com/adamkadaban/ntlmcrack
Use ntlm.pw to quickly and automatically convert hash dumps to credentials
https://github.com/adamkadaban/ntlmcrack
ad crack hashcat lm netexec nt ntlm nxc
Last synced: 6 months ago
JSON representation
Use ntlm.pw to quickly and automatically convert hash dumps to credentials
- Host: GitHub
- URL: https://github.com/adamkadaban/ntlmcrack
- Owner: Adamkadaban
- Created: 2023-12-16T08:29:03.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2024-05-01T20:03:21.000Z (over 1 year ago)
- Last Synced: 2025-04-12T19:08:14.731Z (6 months ago)
- Topics: ad, crack, hashcat, lm, netexec, nt, ntlm, nxc
- Language: Python
- Homepage:
- Size: 1.56 MB
- Stars: 4
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# NTLMCrack
Use [ntlm.pw](https://ntlm.pw) (by [@lkarlslund](https://github.com/lkarlslund/)) to automatically convert hash dumps to credentials## Features
- [x] Lookup cracked NTLM hashes straight from hashdump (hashcat format)
- [x] Split cracked hashes into 2 separate files with `-s`
- [x] Filter uncracked hashes with `-f`
- [x] Import hashes directly from [NetExec](https://github.com/Pennyw0rth/NetExec) [nxcdb](https://www.netexec.wiki/getting-started/database-general-usage) with `-X`## Demo

## Should I Use This?
If this is a lab environment without any sensitive passwords, then sure.
Otherwise, read [here](https://ntlm.pw/unintended-consequences)
## Usage
```
usage: NTLMCrack [-h] [-X [workspace]] [-s] [-n N] [-f] [file_path]Use ntlm.pw to automatically convert hash dumps to credentials
positional arguments:
file_path Path to the file containing hash dumpsoptions:
-h, --help show this help message and exit
-X [workspace], --nxc [workspace]
Dump hashes from netexec. Will use currently selected workspace by default
-s, --separate-files Output credentials in separate files
-n N Limit to the first n lines of the file
-f, --filter-not-found
Filter hashes that can't be cracked
```## Installation
* With pipx:
```bash
pipx install git+https://github.com/Adamkadaban/NTLMCrack
```## Examples
Output to one file:
```bash
NTLMCrack example_hashes/hashes -n 100
```Output to separate files:
```bash
NTLMCrack example_hashes/hashes -n 100 -s
```Filter hashes that can't be cracked:
```bash
NTLMCrack example_hashes/hashes -f
```Import hashes from current NetExec workspace:
```bash
NTLMCrack -X
```Import hashes from specified NetExec workspace:
```bash
NTLMCrack -X GOAD
```