Active Directory Group Policy Preferences cpassword cracker/decrypter.
☆24Apr 14, 2021Updated 4 years ago
Alternatives and similar repositories for gpocrack
Users that are interested in gpocrack are comparing it to the libraries listed below
Sorting:
- Development framework for the BlackArch Linux distribution.☆16May 12, 2020Updated 5 years ago
- Improved version of pintool☆17Jul 24, 2016Updated 9 years ago
- Log Examination Tool☆27Oct 11, 2016Updated 9 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- Utilities for the memory forensics framework☆22Jul 31, 2018Updated 7 years ago
- $MFT Record Viewer☆24Nov 9, 2022Updated 3 years ago
- Offensive tool for fileless lateral movement on Windows networks☆26May 7, 2024Updated last year
- A simple script to elevate current session to SYSTEM (needs to be run as Administrator)☆16Nov 11, 2024Updated last year
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- A fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.☆15Nov 14, 2023Updated 2 years ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- Offensive tool for Active Directory reconnaissance☆12Jan 28, 2026Updated last month
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- Fetch, install and search exploit archives from exploit sites.☆118Oct 10, 2023Updated 2 years ago
- Finds event logs between two time points. Useful for helpdesk/support/malware analysis.☆47Feb 26, 2019Updated 7 years ago
- Check the Domain for Local Admin Access☆20Feb 20, 2025Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 3 months ago
- Official BlackArch Linux PKGBUILD templates.☆33Feb 2, 2026Updated last month
- Invoke-Decoder – A PowerShell script to decode/deobfuscate malware samples☆18Aug 2, 2020Updated 5 years ago
- ☆26Apr 1, 2022Updated 3 years ago
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 4 months ago
- A Nmap script optimized for Hack the Box and CTFs☆14Feb 22, 2021Updated 5 years ago
- Outils ESD academy☆63May 5, 2022Updated 3 years ago
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- This Python code will quickly find duplicates or similarities in sets of data.☆10Feb 6, 2018Updated 8 years ago
- Discord C2 Profile for Mythic☆32Feb 18, 2025Updated last year
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆24May 30, 2018Updated 7 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- Extract common Windows artifacts from source images and VSCs☆65May 10, 2021Updated 4 years ago
- transparent TCP-to-proxy redirector☆16Dec 8, 2019Updated 6 years ago
- Allows external systems or MCUs to connect BLE (CC2540) using HCI as BLE Central Role☆11Jul 1, 2015Updated 10 years ago
- Arduino Library for the Lepton FLiR Thermal Camera Module.☆12Jan 13, 2018Updated 8 years ago
- Explore the Electron APIs☆13Jun 2, 2016Updated 9 years ago
- Control thousands of WS2811/2812 LEDs at video refresh speeds☆12May 5, 2015Updated 10 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 4 years ago
- software for the Girl Tech IM-Me☆12Mar 19, 2015Updated 11 years ago