responder

Community

Capture Net-NTLMv2 hashes.

AuthorAeonDave
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill captures Net-NTLMv2 hashes from Windows hosts on a local network by poisoning name resolution protocols like LLMNR, NBT-NS, and mDNS.

Core Features & Use Cases

  • Hash Capture: Intercepts and saves Net-NTLMv2 hashes from authenticating Windows hosts.
  • Poisoning Attacks: Actively poisons LLMNR, NBT-NS, and mDNS to force authentication.
  • Rogue Servers: Can set up rogue SMB, HTTP, and other servers for credential capture.
  • Use Case: When asked to capture NTLM hashes from Windows machines on the network for offline cracking or relay attacks.

Quick Start

Start Responder in active poisoning mode on the eth0 interface, capturing hashes and enabling verbose output.

Dependency Matrix

Required Modules

None required

Components

references

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: responder
Download link: https://github.com/AeonDave/malskill/archive/main.zip#responder

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.