responder
CommunityCapture Net-NTLMv2 hashes.
AuthorAeonDave
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill captures Net-NTLMv2 hashes from Windows hosts on a local network by poisoning name resolution protocols like LLMNR, NBT-NS, and mDNS.
Core Features & Use Cases
- Hash Capture: Intercepts and saves Net-NTLMv2 hashes from authenticating Windows hosts.
- Poisoning Attacks: Actively poisons LLMNR, NBT-NS, and mDNS to force authentication.
- Rogue Servers: Can set up rogue SMB, HTTP, and other servers for credential capture.
- Use Case: When asked to capture NTLM hashes from Windows machines on the network for offline cracking or relay attacks.
Quick Start
Start Responder in active poisoning mode on the eth0 interface, capturing hashes and enabling verbose output.
Dependency Matrix
Required Modules
None requiredComponents
references
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: responder Download link: https://github.com/AeonDave/malskill/archive/main.zip#responder Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.