<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Tools on zyn3rgy.io</title><link>https://zyn3rgy.io/tools/</link><description>Recent content in Tools on zyn3rgy.io</description><generator>Hugo</generator><language>en-US</language><lastBuildDate>Tue, 04 Nov 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://zyn3rgy.io/tools/index.xml" rel="self" type="application/rss+xml"/><item><title>LdapRelayScan</title><link>https://zyn3rgy.io/tools/ldaprelayscan/</link><pubDate>Sun, 16 Jan 2022 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/tools/ldaprelayscan/</guid><description>&lt;p&gt;Checks whether Domain Controllers enforce LDAP channel binding and LDAP server signing requirements — two key protections against NTLM relay attacks targeting LDAP/S. LDAPS channel binding can be checked unauthenticated; LDAP signing checks require valid domain credentials. Supports Docker deployment and SOCKS proxy for use through C2.&lt;/p&gt;</description></item><item><title>smbtakeover</title><link>https://zyn3rgy.io/tools/smbtakeover/</link><pubDate>Thu, 01 Aug 2024 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/tools/smbtakeover/</guid><description>&lt;p&gt;Unbinds and rebinds 445/tcp on Windows without loading a driver, injecting a module into LSASS, or rebooting the host — easing SMB-based NTLM relay operations over C2. Available as both a Python implementation and a Beacon Object File (BOF), using RPC over TCP to interact with the Server Service.&lt;/p&gt;</description></item><item><title>RelayInformer</title><link>https://zyn3rgy.io/tools/relayinformer/</link><pubDate>Tue, 04 Nov 2025 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/tools/relayinformer/</guid><description>&lt;p&gt;Determines Extended Protection for Authentication (EPA) enforcement levels of popular NTLM relay targets from an offensive perspective. Helps inform relay setup by identifying services where EPA could block relay attacks. Available as both Python and BOF implementations.&lt;/p&gt;</description></item><item><title>ClickonceHunter</title><link>https://zyn3rgy.io/tools/clickoncehunter/</link><pubDate>Fri, 14 Oct 2022 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/tools/clickoncehunter/</guid><description>&lt;p&gt;A web scraper that uses chromedp and HTTP requests to find published ClickOnce applications via Google and Swisscows search engines. Supports AWS API Gateway IP rotation to avoid rate limiting and HTTP proxy for routing traffic.&lt;/p&gt;</description></item><item><title>ecp_slap</title><link>https://zyn3rgy.io/tools/ecp-slap/</link><pubDate>Fri, 23 Oct 2020 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/tools/ecp-slap/</guid><description>&lt;p&gt;Scans and exploits CVE-2020-0688 on on-premises Exchange servers. Includes three functions: scan (cookie extraction + version check), generate (ysoserial payload creation), and exploit (authenticated remote code execution via deserialization).&lt;/p&gt;</description></item></channel></rss>