ShutdownRepo / Get-GPPPasswordLinks
Python script for extracting and decrypting Group Policy Preferences passwords
☆26Updated 4 years ago
Alternatives and similar repositories for Get-GPPPassword
Users that are interested in Get-GPPPassword are comparing it to the libraries listed below
Sorting:
- ☆47Updated 3 years ago
- Password list generator for password spraying - prebaked with goodies☆106Updated 2 years ago
- ☆141Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Custom queries list for BloodHound☆31Updated 4 months ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆128Updated 2 weeks ago
- PowerShell Reverse Shell☆79Updated 2 years ago
- Simple PoC in PowerShell for CVE-2023-23397☆39Updated 2 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆45Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆114Updated 4 months ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- ☆161Updated last year
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆79Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆98Updated last year
- ☆92Updated 5 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Updated 3 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆122Updated 3 years ago
- ☆122Updated 2 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- Modular Enumeration and Password Spraying Framework☆129Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆182Updated last year
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆20Updated 2 years ago
- AzureAD Pentest☆24Updated 3 years ago
- crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.☆31Updated 3 years ago