A python script to automatically list vulnerable Windows ACEs/ACLs.
☆66Jun 25, 2025Updated 9 months ago
Alternatives and similar repositories for abuseACL
Users that are interested in abuseACL are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Python script to list valid emails of GSuite accounts.☆16Feb 11, 2025Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆156Nov 2, 2025Updated 4 months ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆31Jan 22, 2026Updated 2 months ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Powershell UAC Bypass script leveraging WinSAT.exe☆16Dec 21, 2021Updated 4 years ago
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Oct 18, 2024Updated last year
- ☆27May 1, 2023Updated 2 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆45Oct 2, 2023Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- C# Port of LdapRelayScan☆91Nov 26, 2025Updated 3 months ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated 2 years ago
- ☆12Feb 19, 2026Updated last month
- ☆53Oct 10, 2023Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆103May 6, 2024Updated last year
- Challenge pour l'édition 2022 du midnight flag☆16May 2, 2022Updated 3 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- A C# implementation of dumping credentials from Windows Credential Manager☆62Sep 23, 2023Updated 2 years ago
- Validates priv escalation of AD trusts☆47Apr 1, 2025Updated 11 months ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆207Jan 12, 2025Updated last year
- ☆98Jun 22, 2025Updated 9 months ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Active Directory information dumper via ADWS for evasion purposes.☆207Feb 23, 2026Updated last month
- linikatz is a tool to attack AD on UNIX☆156Oct 19, 2023Updated 2 years ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆145Feb 1, 2026Updated last month
- BloodHound Automation: Collection, Analysis and Data Import☆19Nov 12, 2025Updated 4 months ago
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,135Oct 21, 2024Updated last year
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆163Apr 22, 2025Updated 11 months ago
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago
- Recovering NTLM hashes from Credential Guard☆377Dec 26, 2022Updated 3 years ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆76Feb 9, 2024Updated 2 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- ☆153Oct 2, 2023Updated 2 years ago
- DPAPI looting remotely and locally in Python☆543Mar 13, 2026Updated last week
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆29Aug 18, 2025Updated 7 months ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆54Feb 29, 2024Updated 2 years ago
- malleable profile generator GUI for Havoc