GolenGMSA tool for working with GMSA passwords
☆172Aug 21, 2025Updated 7 months ago
Alternatives and similar repositories for GoldenGMSA
Users that are interested in GoldenGMSA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof-of-concept tools for my AD Forest trust research☆235Jun 10, 2024Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆103May 6, 2024Updated last year
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- A C# utility for interacting with SCCM☆686Mar 30, 2026Updated 2 weeks ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆737Sep 3, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆482Nov 20, 2022Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Framework for Kerberos relaying☆945May 29, 2022Updated 3 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆131Jan 14, 2023Updated 3 years ago
- Recovering NTLM hashes from Credential Guard☆379Dec 26, 2022Updated 3 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆144Mar 9, 2024Updated 2 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆347Jan 22, 2025Updated last year
- ☆142May 4, 2022Updated 3 years ago
- ☆382Aug 7, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- OPSEC safe Kerberoasting in C#☆198Jun 14, 2022Updated 3 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆872Mar 20, 2023Updated 3 years ago
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- TCP Port Redirection Utility☆768Jan 31, 2023Updated 3 years ago
- Azure JWT Token Manipulation Toolset☆727Dec 6, 2024Updated last year
- ☆75Jun 17, 2025Updated 9 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆991Dec 4, 2022Updated 3 years ago
- Collection of CobaltStrike beacon object files☆105Feb 14, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ADCS cert template modification and ACL enumeration☆143Jun 26, 2023Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆303Oct 26, 2022Updated 3 years ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆891Apr 8, 2025Updated last year
- ☆409Mar 28, 2026Updated 2 weeks ago
- Windows Privilege Escalation from User to Domain Admin.☆1,455Dec 18, 2022Updated 3 years ago
- ☆430Apr 22, 2025Updated 11 months ago
- Python version of the C# tool for "Shadow Credentials" attacks☆874Feb 14, 2026Updated 2 months ago
- Beacon Object Files for roasting Active Directory☆237Feb 21, 2022Updated 4 years ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆456Dec 23, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Beacon Object File & C# project to check LDAP signing☆200Aug 7, 2024Updated last year
- ☆235Oct 8, 2024Updated last year
- ☆170Jan 7, 2022Updated 4 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆87Mar 22, 2023Updated 3 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆364Dec 13, 2025Updated 4 months ago
- BOF combination of KillDefender and Backstab☆167Mar 23, 2023Updated 3 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆65Feb 8, 2022Updated 4 years ago