X-C3LL / GPOwned
Buggy script to play with GPOs
☆85Updated this week
Related projects ⓘ
Alternatives and complementary repositories for GPOwned
- ☆138Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆78Updated 11 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆123Updated 8 months ago
- ☆36Updated last month
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆52Updated 4 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 2 years ago
- Get Fine Grained Password Policy☆65Updated 6 months ago
- DLL Hijack Search Order Enumeration BOF☆141Updated 3 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆96Updated 2 years ago
- Beacon Object File & C# project to check LDAP signing☆174Updated 3 months ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆138Updated 8 months ago
- ☆151Updated 2 weeks ago
- C# version of Powermad☆156Updated 11 months ago
- ☆91Updated 2 years ago
- ☆89Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆173Updated 2 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆119Updated 3 years ago
- ADCS cert template modification and ACL enumeration☆129Updated last year
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆48Updated 5 months ago
- Find .net assemblies locally☆92Updated 2 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆86Updated 2 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆121Updated 3 years ago
- MSBuild without MSbuild.exe☆128Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆140Updated 3 years ago
- Coerce Windows machines auth via MS-EVEN☆153Updated 10 months ago
- Slide decks and/or materials from conference presentations☆54Updated 2 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago