MartinIngesen / gpocrack
Active Directory Group Policy Preferences cpassword cracker/decrypter.
☆23Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for gpocrack
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 6 years ago
- Hunt malware with Volatility☆47Updated 6 months ago
- isodump - ISO dump utility☆38Updated 5 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆24Updated 3 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 2 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 4 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆17Updated 5 years ago
- Hashes of infamous malware☆25Updated last year
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆25Updated last year
- scripts to setup environments for red/blue teams.☆16Updated 11 months ago
- Site for IWS book content☆18Updated 6 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆12Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- Audits AD hashdump and looks for instances for password reuse☆12Updated 5 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 3 years ago
- ☆76Updated 6 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 3 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated 4 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 2 years ago
- Collection of rules and debug data for hashcat☆17Updated 7 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Random Hashcat Scrips☆22Updated last month
- Import Nmap scans to Cherrytree☆36Updated 2 years ago
- ☆41Updated last month
- Repository for LNK stuff☆27Updated 2 years ago
- Exfiltration based on custom X509 certificates☆26Updated 8 months ago