X-C3LL / GPOwnedView external linksLinks
Buggy script to play with GPOs
☆122Dec 27, 2024Updated last year
Alternatives and similar repositories for GPOwned
Users that are interested in GPOwned are comparing it to the libraries listed below
Sorting:
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆155Nov 2, 2025Updated 3 months ago
- ADCS cert template modification and ACL enumeration☆144Jun 26, 2023Updated 2 years ago
- Partial python implementation of SharpGPOAbuse☆518Nov 9, 2025Updated 3 months ago
- MS-FSRVP coercion abuse PoC☆305Dec 30, 2021Updated 4 years ago
- Dumping DPAPI credz remotely☆1,318Mar 24, 2025Updated 10 months ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,297Dec 15, 2020Updated 5 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆130Oct 10, 2021Updated 4 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆353Feb 12, 2024Updated 2 years ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆724Sep 3, 2025Updated 5 months ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆439Jan 4, 2025Updated last year
- ADCS abuser☆311Feb 6, 2023Updated 3 years ago
- ☆477Nov 20, 2022Updated 3 years ago
- Python version of the C# tool for "Shadow Credentials" attacks☆851Feb 1, 2026Updated last week
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆410May 29, 2024Updated last year
- TCP Port Redirection Utility☆760Jan 31, 2023Updated 3 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆882Feb 5, 2026Updated last week
- ☆827Sep 9, 2022Updated 3 years ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,077Jan 31, 2026Updated last week
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,174Jan 5, 2026Updated last month
- NTLMv1 Multitool☆662Nov 30, 2025Updated 2 months ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆93Mar 8, 2023Updated 2 years ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆73May 18, 2020Updated 5 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆532Nov 19, 2024Updated last year
- A (partial) Python rewriting of PowerSploit's PowerView☆1,098Jan 21, 2026Updated 3 weeks ago
- .NET implementation of Cobalt Strike's External C2 Spec☆90Nov 12, 2021Updated 4 years ago
- GolenGMSA tool for working with GMSA passwords☆167Aug 21, 2025Updated 5 months ago
- C# version of Powermad☆170Dec 5, 2023Updated 2 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,628Aug 6, 2022Updated 3 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆142Mar 9, 2024Updated last year
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆929Nov 11, 2024Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆386Feb 23, 2024Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,256Dec 9, 2025Updated 2 months ago
- Tools for Kerberos PKINIT and relaying to AD CS☆874Jan 3, 2025Updated last year
- ☆67Dec 24, 2021Updated 4 years ago
- A C# utility for interacting with SCCM☆682Aug 20, 2025Updated 5 months ago
- Framework for Kerberos relaying☆939May 29, 2022Updated 3 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆777Oct 16, 2025Updated 3 months ago
- WhoAmI by asking the LDAP service on a domain controller.☆64Feb 8, 2022Updated 4 years ago