A python script to automatically list vulnerable Windows ACEs/ACLs.
☆63Jun 25, 2025Updated 8 months ago
Alternatives and similar repositories for abuseACL
Users that are interested in abuseACL are comparing it to the libraries listed below
Sorting:
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Nov 2, 2025Updated 4 months ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- A Python script to list valid emails of GSuite accounts.☆15Feb 11, 2025Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- ☆27May 1, 2023Updated 2 years ago
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆28Aug 18, 2025Updated 6 months ago
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Oct 18, 2024Updated last year
- ☆12Feb 19, 2026Updated last week
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- ☆53Oct 10, 2023Updated 2 years ago
- ☆20May 1, 2023Updated 2 years ago
- A C# implementation of dumping credentials from Windows Credential Manager☆62Sep 23, 2023Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- C# Port of LdapRelayScan☆91Nov 26, 2025Updated 3 months ago
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆207Jan 12, 2025Updated last year
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Oct 2, 2023Updated 2 years ago
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆155Oct 19, 2023Updated 2 years ago
- Validates priv escalation of AD trusts☆48Apr 1, 2025Updated 11 months ago
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆102May 6, 2024Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- DPAPI looting remotely and locally in Python☆542Oct 7, 2025Updated 4 months ago
- Shaco is a linux agent for havoc☆170Oct 25, 2023Updated 2 years ago
- ☆163Oct 25, 2023Updated 2 years ago
- Winsocket for Cobalt Strike.☆103Jul 6, 2023Updated 2 years ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Mar 6, 2024Updated last year
- Rusty Impersonate☆104Oct 15, 2025Updated 4 months ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Feb 9, 2024Updated 2 years ago
- A python script to automatically dump files and source code of a Symfony server in debug mode.☆13Feb 11, 2025Updated last year
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- ☆14Jun 27, 2024Updated last year
- ☆20Sep 6, 2025Updated 5 months ago
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- ☆15Aug 17, 2023Updated 2 years ago