ShutdownRepo / Get-GPPPassword
Python script for extracting and decrypting Group Policy Preferences passwords
☆23Updated 3 years ago
Alternatives and similar repositories for Get-GPPPassword
Users that are interested in Get-GPPPassword are comparing it to the libraries listed below
Sorting:
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆27Updated 4 months ago
- Used to get NTLMv2 Hashes from SMB☆12Updated 6 months ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆55Updated 3 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- ☆39Updated 3 months ago
- ☆47Updated 3 years ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆44Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Duplicate not owned Token from Running Process☆72Updated last year
- PowerShell Reverse Shell☆78Updated 2 years ago
- ☆85Updated 4 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆82Updated last year
- A little cheatsheet for NetExec☆22Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated last month
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 5 months ago
- ☆51Updated last year
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆48Updated last week
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Updated 3 years ago
- ☆52Updated last year
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆15Updated 2 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆57Updated last week
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 3 months ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- ☆49Updated 2 years ago
- ☆44Updated 10 months ago
- Automated exploitation of MSSQL servers at scale☆108Updated 2 weeks ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆32Updated 7 months ago
- Get Fine Grained Password Policy☆70Updated last month
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆80Updated 8 months ago