SkillAgentSearch skills...

RelayInformer

Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective

Install / Use

/learn @zyn3rgy/RelayInformer
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

<p align="center"> <img src=".github/img/logo1.png" alt="RelayInformer Logo" width="300"/> </p> <p align="center"> Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective <br> <br> <a href="https://github.com/specterops#mythic"> <img src="https://img.shields.io/endpoint?url=https%3A%2F%2Fraw.githubusercontent.com%2Fspecterops%2F.github%2Fmain%2Fconfig%2Fshield.json" alt="Sponsored by SpecterOps"/> </a> </p>

Introduction

These tools were written to compliment research summarized in a blog post / presentation by @Tw1sm and myself.

NTLM relay is still a widely abused attack vector during pentests and red teams alike. Depending on your network access perspective, setting up for a relay can be an involved and error-prone process (e.g. over C2). The goal of this toolset is to better inform your NTLM relays, especially in cases where Extended Protection for Authentication (EPA) could be enforced as a mitigation.

Usage

See the RelayInformer [Python] and RelayInformer [BOFs] documentation for details and example usage.

Acknowledgements

Related Skills

View on GitHub
GitHub Stars168
CategoryProduct
Updated3d ago
Forks6

Languages

C

Security Score

80/100

Audited on Mar 25, 2026

No findings