☆161Aug 18, 2023Updated 2 years ago
Alternatives and similar repositories for GPRegistryPolicyParser
Users that are interested in GPRegistryPolicyParser are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆116Aug 9, 2020Updated 5 years ago
- Conversion tool used to Convert Group Policy baselines into DSC☆272Aug 5, 2021Updated 4 years ago
- ☆15Jun 28, 2024Updated last year
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆126Jun 22, 2020Updated 5 years ago
- A PowerShell wrapper for certutil.exe☆20Mar 18, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Scripts from my debugging PowerShell talk☆21Nov 27, 2019Updated 6 years ago
- Enable remote execution of scripts. Works with Pester.☆75Nov 27, 2017Updated 8 years ago
- A tool to help query AD via the LDAP protocol☆626Sep 25, 2024Updated last year
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆808Apr 2, 2026Updated last month
- Tool to audit and attack LAPS environments☆944Jan 31, 2018Updated 8 years ago
- ☆28Apr 19, 2017Updated 9 years ago
- A C# utility for interacting with SCCM☆688Mar 30, 2026Updated last month
- A janky, neo4j based CMDB glued together with PowerShell☆17Oct 24, 2019Updated 6 years ago
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Aug 31, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Modules with DSC resources for the PackageManagement(aka OneGet) providers.☆36Apr 12, 2018Updated 8 years ago
- "Golden" certificates☆717Aug 17, 2024Updated last year
- UI used to manage Permanent WMI Event Consumers☆14Mar 21, 2015Updated 11 years ago
- Malicious WMI Events using PowerShell☆395Jul 25, 2016Updated 9 years ago
- Simple script to display AD Replication topology in a graph☆17Dec 21, 2018Updated 7 years ago
- Collection of remote authentication triggers in C#☆529May 15, 2024Updated 2 years ago
- Interactive pipeline filtering in PowerShell (a port of peco).☆22Jul 9, 2019Updated 6 years ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,325Dec 15, 2020Updated 5 years ago
- All associated scripts and files for the Managing and Automating Active Directory with PowerShell course☆13Aug 16, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆27Aug 18, 2022Updated 3 years ago
- ☆1,533Aug 11, 2023Updated 2 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- A PowerShell module to create, manage and publish NuGet packages.☆13Jan 22, 2020Updated 6 years ago
- A powershell module that enhances the output of Write-Host, Write-Debug, Write-Verbose, Write-Information and Write-Warning☆12Feb 13, 2025Updated last year
- Make it easier to find problem devices on your computer and find the corresponding driver.☆11Sep 18, 2018Updated 7 years ago
- Community repository for access control DSC resources☆33Aug 31, 2015Updated 10 years ago
- A PowerShell module that uses the WIN_API to access the registry☆14Apr 13, 2017Updated 9 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆147Mar 9, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,124May 29, 2024Updated last year
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆382Jul 25, 2019Updated 6 years ago
- Chameleon: A tool for evading Proxy categorisation☆516Nov 28, 2024Updated last year
- A tiny tool built to help AD Admins tame the Protected Users group.☆142Mar 22, 2026Updated last month
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆854Dec 2, 2023Updated 2 years ago
- Concurrent Programming in PowerShell with the Producer Consumer Pattern☆39Sep 11, 2018Updated 7 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago