An open API service indexing awesome lists of open source software.

https://github.com/adamkadaban/ntlmcrack

Use ntlm.pw to quickly and automatically convert hash dumps to credentials
https://github.com/adamkadaban/ntlmcrack

ad crack hashcat lm netexec nt ntlm nxc

Last synced: 6 months ago
JSON representation

Use ntlm.pw to quickly and automatically convert hash dumps to credentials

Awesome Lists containing this project

README

          

# NTLMCrack
Use [ntlm.pw](https://ntlm.pw) (by [@lkarlslund](https://github.com/lkarlslund/)) to automatically convert hash dumps to credentials

## Features

- [x] Lookup cracked NTLM hashes straight from hashdump (hashcat format)
- [x] Split cracked hashes into 2 separate files with `-s`
- [x] Filter uncracked hashes with `-f`
- [x] Import hashes directly from [NetExec](https://github.com/Pennyw0rth/NetExec) [nxcdb](https://www.netexec.wiki/getting-started/database-general-usage) with `-X`

## Demo

![](./demo.gif)

## Should I Use This?

If this is a lab environment without any sensitive passwords, then sure.

Otherwise, read [here](https://ntlm.pw/unintended-consequences)

## Usage

```
usage: NTLMCrack [-h] [-X [workspace]] [-s] [-n N] [-f] [file_path]

Use ntlm.pw to automatically convert hash dumps to credentials

positional arguments:
file_path Path to the file containing hash dumps

options:
-h, --help show this help message and exit
-X [workspace], --nxc [workspace]
Dump hashes from netexec. Will use currently selected workspace by default
-s, --separate-files Output credentials in separate files
-n N Limit to the first n lines of the file
-f, --filter-not-found
Filter hashes that can't be cracked
```

## Installation
* With pipx:
```bash
pipx install git+https://github.com/Adamkadaban/NTLMCrack
```

## Examples

Output to one file:
```bash
NTLMCrack example_hashes/hashes -n 100
```

Output to separate files:
```bash
NTLMCrack example_hashes/hashes -n 100 -s
```

Filter hashes that can't be cracked:
```bash
NTLMCrack example_hashes/hashes -f
```

Import hashes from current NetExec workspace:
```bash
NTLMCrack -X
```

Import hashes from specified NetExec workspace:
```bash
NTLMCrack -X GOAD
```