Active Directory Group Policy Preferences cpassword cracker/decrypter.
☆24Apr 14, 2021Updated 4 years ago
Alternatives and similar repositories for gpocrack
Users that are interested in gpocrack are comparing it to the libraries listed below
Sorting:
- Development framework for the BlackArch Linux distribution.☆16May 12, 2020Updated 5 years ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- Utilities for the memory forensics framework☆22Jul 31, 2018Updated 7 years ago
- A simple script to elevate current session to SYSTEM (needs to be run as Administrator)☆16Nov 11, 2024Updated last year
- Check the Domain for Local Admin Access☆20Feb 20, 2025Updated last year
- ☆21Feb 14, 2022Updated 4 years ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆20Mar 24, 2025Updated 11 months ago
- Improved version of pintool☆17Jul 24, 2016Updated 9 years ago
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 3 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- $MFT Record Viewer☆24Nov 9, 2022Updated 3 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- ☆26Apr 1, 2022Updated 3 years ago
- Extract common Windows artifacts from source images and VSCs☆64May 10, 2021Updated 4 years ago
- Log Examination Tool☆27Oct 11, 2016Updated 9 years ago
- ☆48Jun 6, 2025Updated 8 months ago
- Shellcode injector using direct syscalls☆123Aug 17, 2020Updated 5 years ago
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- ☆28May 25, 2021Updated 4 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 4 years ago
- Discord C2 Profile for Mythic☆33Feb 18, 2025Updated last year
- A little cheatsheet for NetExec☆33May 2, 2024Updated last year
- ☆82Jul 5, 2016Updated 9 years ago
- A timestamp and date decoder written for python 3☆41Jan 22, 2026Updated last month
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Oct 23, 2019Updated 6 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- This repo contains a list of aws security related talks.☆12Dec 5, 2017Updated 8 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Spoofcheck☆46May 21, 2025Updated 9 months ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- The Python book for developers who miss curly braces. Learn real Python while complaining about whitespace. 15 chapters of education, com…☆15Aug 21, 2025Updated 6 months ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago