Active Directory Group Policy Preferences cpassword cracker/decrypter.
☆24Apr 14, 2021Updated 5 years ago
Alternatives and similar repositories for gpocrack
Users that are interested in gpocrack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Log Examination Tool☆27Oct 11, 2016Updated 9 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- Utilities for the memory forensics framework☆22Jul 31, 2018Updated 7 years ago
- $MFT Record Viewer☆24Nov 9, 2022Updated 3 years ago
- Offensive tool for fileless lateral movement on Windows networks☆27May 7, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A simple script to elevate current session to SYSTEM (needs to be run as Administrator)☆16Nov 11, 2024Updated last year
- ☆21Feb 14, 2022Updated 4 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- A little cheatsheet for NetExec☆33May 2, 2024Updated 2 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆38Oct 23, 2018Updated 7 years ago
- Offensive tool for Active Directory reconnaissance☆12Jan 28, 2026Updated 3 months ago
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆20Mar 24, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Finds event logs between two time points. Useful for helpdesk/support/malware analysis.☆48Feb 26, 2019Updated 7 years ago
- Check the Domain for Local Admin Access☆20Feb 20, 2025Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 4 months ago
- Invoke-Decoder – A PowerShell script to decode/deobfuscate malware samples☆18Aug 2, 2020Updated 5 years ago
- ☆28Apr 1, 2022Updated 4 years ago
- A Nmap script optimized for Hack the Box and CTFs☆15Feb 22, 2021Updated 5 years ago
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- Discord C2 Profile for Mythic☆33Feb 18, 2025Updated last year
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- Extract common Windows artifacts from source images and VSCs☆65May 10, 2021Updated 4 years ago
- transparent TCP-to-proxy redirector☆16Dec 8, 2019Updated 6 years ago
- Arduino Library for the Lepton FLiR Thermal Camera Module.☆12Jan 13, 2018Updated 8 years ago
- Control thousands of WS2811/2812 LEDs at video refresh speeds☆12May 5, 2015Updated 10 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 5 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Tools I wrote for personal use in C, Python, Powershell, Bash, ...☆46Dec 14, 2018Updated 7 years ago
- Creating a ransomware in a minute☆30Apr 25, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆50Jun 6, 2025Updated 10 months ago
- ☆12Mar 24, 2018Updated 8 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 5 years ago
- This repo contains a list of aws security related talks.☆12Dec 5, 2017Updated 8 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago