Author of the Wolf offensive toolkit. Contact: strongwind@brv.email
| Tool | Purpose | Lang |
|---|---|---|
| CredWolf | Validate AD credentials over NTLM and Kerberos — passwords, hashes, keys, tickets | Python |
| KerbWolf | Kerberos roasting and TGT attack toolkit for Active Directory | Python |
| NFSWolf | Native NFSv2/v3/v4 recon, enumeration, exploitation, and interactive shell | Rust |
| WPAWolf | WPA / WPA2 / WPA3-FT-PSK handshake extractor for hashcat (modes 22000 + 37100) | Rust |
Currently researching:
- new Kerberos abuse primitives in KerbWolf
- deeper WPA/WPA2 PSK analysis with WPAWolf
- folding public NFS vulnerabilities into NFSWolf as a single fast, statically-linked binary
- Kerberos — protocol internals, security configuration, and attack techniques in MS Active Directory
- WiFi_Cracking — WPA / WPA2 PSK security analysis reference
|
Blog coming soon. |
|
|
- Email: strongwind@brv.email
- Mastodon: @StrongWind@infosec.exchange
- X: @Strong1Wind
- Reddit: u/StrongWind1