Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords
☆33May 11, 2019Updated 6 years ago
Alternatives and similar repositories for Invoke-GPPCSE
Users that are interested in Invoke-GPPCSE are comparing it to the libraries listed below
Sorting:
- ☆18Feb 14, 2019Updated 7 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆10Dec 6, 2017Updated 8 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- A tool to password spray Jenkins instances☆60May 28, 2019Updated 6 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 7 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆73Feb 28, 2020Updated 6 years ago
- A HTA shell to assist with breakout assessments.☆113Oct 20, 2021Updated 4 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆179Oct 21, 2018Updated 7 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- A PowerShell script for performing a build review of a Windows host☆23Mar 11, 2019Updated 6 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆19Jun 16, 2019Updated 6 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 4 years ago
- Windows RID Hijacking persistence technique☆178Nov 20, 2024Updated last year
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- ☆351Feb 21, 2022Updated 4 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- A simple client to demonstrate Layer-2 pivoting. Compatible with the simpletun.c server written by Davide Brini.☆78Oct 15, 2014Updated 11 years ago
- Samba, NFS shares spider and grepper☆71Jul 11, 2018Updated 7 years ago
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- Splunk Web Shell☆51Mar 25, 2015Updated 10 years ago
- Credential Dumper☆79Feb 19, 2020Updated 6 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Jul 6, 2021Updated 4 years ago
- Packer and vagrant scripts to automate building Windows and Linux machines on vCenter☆17Jul 7, 2019Updated 6 years ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago