Responder 2.0 - Owning Windows Networks part 3 | Trustwave | SpiderLabs | Trustwave
KSEC ARK - Pentesting and redteam knowledge base | Responder - Ultimate Guide
Combining Responder and PsExec for Internal Penetration Tests | Rapid7 Blog
How to use Responder to capture NetNTLM and grab a shell - A2Secure
ADCluemmelSec on Twitter: "So you want to run @PythonResponder's https://t.co/VbAV7aZWMw in WSL? reg add HKLM\SYSTEM\CurrentControlSet\Services\NetBT /v SMBDeviceEnabled /t REG_QWORD /d 0 Stop-Service "LanmanServer" -Force Set-Service "LanmanServer ...
Responder v3.1.3 releases: LLMNR/NBT-NS/mDNS Poisoner and NTLMv1/2 Relay
Pwning with Responder - A Pentester's Guide | NotSoSecure
KSEC ARK - Pentesting and redteam knowledge base | Responder - CheatSheet
responder · PyPI
GitHub - SpiderLabs/Responder: Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
How to use Responder to capture NetNTLM and grab a shell - A2Secure
Why Responder Will Change Your Life
Responder - Mastering Kali Linux for Advanced Penetration Testing - Second Edition [Book]
LLMNR and NBT-NS Poisoning Using Responder
Exploiting Windows Network with Responder and MultiRelay - YouTube