A python script to automatically list vulnerable Windows ACEs/ACLs.
☆66Jun 25, 2025Updated 10 months ago
Alternatives and similar repositories for abuseACL
Users that are interested in abuseACL are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Python script to list valid emails of GSuite accounts.☆16Feb 11, 2025Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆157Nov 2, 2025Updated 6 months ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆33Jan 22, 2026Updated 3 months ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Powershell UAC Bypass script leveraging WinSAT.exe☆16Dec 21, 2021Updated 4 years ago
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Oct 18, 2024Updated last year
- ☆27May 1, 2023Updated 3 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆45Oct 2, 2023Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆43Jan 13, 2024Updated 2 years ago
- C# Port of LdapRelayScan☆92Nov 26, 2025Updated 5 months ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated 2 years ago
- ☆12Feb 19, 2026Updated 2 months ago
- ☆54Oct 10, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆104May 6, 2024Updated last year
- Challenge pour l'édition 2022 du midnight flag☆16May 2, 2022Updated 4 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- A C# implementation of dumping credentials from Windows Credential Manager☆62Sep 23, 2023Updated 2 years ago
- Validates priv escalation of AD trusts☆47Apr 1, 2025Updated last year
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆209Jan 12, 2025Updated last year
- ☆99Jun 22, 2025Updated 10 months ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Active Directory information dumper via ADWS for evasion purposes.☆220Feb 23, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- linikatz is a tool to attack AD on UNIX☆156Oct 19, 2023Updated 2 years ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆146Feb 1, 2026Updated 3 months ago
- BloodHound Automation: Collection, Analysis and Data Import☆21Nov 12, 2025Updated 5 months ago
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,145Oct 21, 2024Updated last year
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆164Apr 22, 2025Updated last year
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆76Feb 9, 2024Updated 2 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Recovering NTLM hashes from Credential Guard☆384Dec 26, 2022Updated 3 years ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Feb 11, 2024Updated 2 years ago
- ☆156Oct 2, 2023Updated 2 years ago
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆30Updated this week
- DPAPI looting remotely and locally in Python☆549Mar 13, 2026Updated last month
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 3 years ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆59Feb 29, 2024Updated 2 years ago