PShlyundin / GPOHunter
A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities
☆151Updated this week
Alternatives and similar repositories for GPOHunter:
Users that are interested in GPOHunter are comparing it to the libraries listed below
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆71Updated 3 weeks ago
- Assess the security of your Active Directory with few or all privileges.☆249Updated last week
- ☆170Updated last month
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆165Updated 2 weeks ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆116Updated this week
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆154Updated 3 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆263Updated last month
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆154Updated 3 months ago
- ☆171Updated last month
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆136Updated last month
- ☆136Updated last month
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆170Updated 4 months ago
- Automatically run and populate a new instance of BH CE☆58Updated 2 months ago
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆50Updated last month
- A BloodHound collector for Microsoft Configuration Manager☆261Updated this week
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆150Updated 4 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆128Updated 7 months ago
- Lab used for workshop and CTF☆164Updated 2 months ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆93Updated 4 months ago
- Advanced Email Threat Hunting w/ Detection as Code☆48Updated last month
- Abusing Intune for Lateral Movement over C2☆302Updated 2 weeks ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆103Updated last month
- ☆174Updated last month
- Identify the accounts most vulnerable to dictionary attacks☆94Updated 5 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆181Updated 3 weeks ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆126Updated 2 months ago
- Powershell tools used for Red Team / Pentesting.☆74Updated last year
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆98Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆147Updated last month
- A Azure Exploitation Toolkit for Red Team & Pentesters☆167Updated last year