Buggy script to play with GPOs
☆122Dec 27, 2024Updated last year
Alternatives and similar repositories for GPOwned
Users that are interested in GPOwned are comparing it to the libraries listed below
Sorting:
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Nov 2, 2025Updated 4 months ago
- ADCS cert template modification and ACL enumeration☆143Jun 26, 2023Updated 2 years ago
- Partial python implementation of SharpGPOAbuse☆525Nov 9, 2025Updated 3 months ago
- MS-FSRVP coercion abuse PoC☆303Dec 30, 2021Updated 4 years ago
- Dumping DPAPI credz remotely☆1,329Mar 24, 2025Updated 11 months ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,303Dec 15, 2020Updated 5 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆130Oct 10, 2021Updated 4 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆362Feb 12, 2024Updated 2 years ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆730Sep 3, 2025Updated 6 months ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆439Jan 4, 2025Updated last year
- ADCS abuser☆315Feb 6, 2023Updated 3 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆414May 29, 2024Updated last year
- ☆477Nov 20, 2022Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆94Mar 8, 2023Updated 2 years ago
- Python version of the C# tool for "Shadow Credentials" attacks☆861Feb 14, 2026Updated 2 weeks ago
- TCP Port Redirection Utility☆762Jan 31, 2023Updated 3 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆892Feb 18, 2026Updated 2 weeks ago
- ☆828Sep 9, 2022Updated 3 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,188Jan 5, 2026Updated 2 months ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,098Feb 27, 2026Updated last week
- NTLMv1 Multitool☆659Feb 26, 2026Updated last week
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆73May 18, 2020Updated 5 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆530Nov 19, 2024Updated last year
- A (partial) Python rewriting of PowerSploit's PowerView☆1,100Updated this week
- .NET implementation of Cobalt Strike's External C2 Spec☆89Nov 12, 2021Updated 4 years ago
- GolenGMSA tool for working with GMSA passwords☆170Aug 21, 2025Updated 6 months ago
- C# version of Powermad☆169Dec 5, 2023Updated 2 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,631Aug 6, 2022Updated 3 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆143Mar 9, 2024Updated last year
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆931Nov 11, 2024Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆387Feb 23, 2024Updated 2 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,263Dec 9, 2025Updated 2 months ago
- Tools for Kerberos PKINIT and relaying to AD CS☆882Jan 3, 2025Updated last year
- A C# utility for interacting with SCCM☆682Aug 20, 2025Updated 6 months ago
- Framework for Kerberos relaying☆936May 29, 2022Updated 3 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆64Feb 8, 2022Updated 4 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆779Oct 16, 2025Updated 4 months ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago