GLPI vulnerabilities checking tool
☆158Mar 4, 2026Updated this week
Alternatives and similar repositories for glpwnme
Users that are interested in glpwnme are comparing it to the libraries listed below
Sorting:
- Recon scripts for Red Team and Web blackbox auditing☆25Updated this week
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Nov 2, 2025Updated 4 months ago
- Web File Manager☆11Aug 21, 2025Updated 6 months ago
- Python code to Serialize and Unserialize java binary serialization format.☆29Feb 27, 2026Updated last week
- C++ Reflective Assembly Loader☆31Mar 7, 2025Updated last year
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- Assess the security of your Active Directory with few or all privileges.☆346Updated this week
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆334Jan 14, 2026Updated last month
- Active Directory Mindmap Recipes: A Compromise à la Carte☆150Sep 4, 2025Updated 6 months ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆32Mar 6, 2025Updated last year
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆311Feb 16, 2026Updated 3 weeks ago
- A python tool to automate KeePass discovery and secret extraction.☆518Dec 12, 2024Updated last year
- psexecsvc - a python implementation of PSExec's native service implementation☆238Feb 11, 2025Updated last year
- Obtain a clean-cut architecture at the launch of a mission and run some tests ( subdomain search, fuzzing, make screenshots on a given pe…☆25Jul 18, 2023Updated 2 years ago
- ☆120May 29, 2025Updated 9 months ago
- Data-Shield IPv4 Blocklist Community provides an official, curated registry of IPv4 addresses identified as malicious. Updated continuous…☆439Updated this week
- GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit☆38Feb 8, 2025Updated last year
- DPAPI looting remotely and locally in Python☆542Oct 7, 2025Updated 5 months ago
- ☆23Feb 27, 2026Updated last week
- Deserialization payload generator for a variety of .NET formatters☆176Dec 2, 2025Updated 3 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆261Feb 21, 2025Updated last year
- In-depth ldap enumeration utility☆564Updated this week
- Identify the accounts most vulnerable to dictionary attacks☆121Apr 2, 2025Updated 11 months ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆131Nov 12, 2023Updated 2 years ago
- Dumping DPAPI credz remotely☆1,329Mar 24, 2025Updated 11 months ago
- Specialized testing tool designed to identify vulnerabilities and bugs in OPC UA (Open Platform Communications Unified Architecture) impl…☆43Feb 4, 2026Updated last month
- Local SYSTEM auth trigger for relaying☆168Jul 22, 2025Updated 7 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Nov 16, 2025Updated 3 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆267Apr 8, 2025Updated 11 months ago
- ☆142Sep 9, 2025Updated 6 months ago
- ☆176Apr 9, 2025Updated 11 months ago
- The DCERPC only printerbug.py version☆208Oct 30, 2025Updated 4 months ago
- A tool for pointesters to find candies in SharePoint☆281Nov 4, 2022Updated 3 years ago
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- ☆215Mar 26, 2024Updated last year
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆471May 16, 2024Updated last year
- Execute commands, in/exfiltrate files using your custom RPC Server☆65Jan 13, 2026Updated last month
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆191Apr 26, 2025Updated 10 months ago
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆59Apr 29, 2023Updated 2 years ago