Precompiled executable
☆67Feb 21, 2025Updated last year
Alternatives and similar repositories for SharpGPOAbuse
Users that are interested in SharpGPOAbuse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Yet another Werkzeug Console Pin Exploit Explanation☆23Jul 30, 2021Updated 4 years ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,321Dec 15, 2020Updated 5 years ago
- Python setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆130Oct 28, 2024Updated last year
- Powershell version of SharpGPOAbuse☆91May 21, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆16Mar 9, 2026Updated last month
- CVE-2023-2255 Libre Office☆64Jul 10, 2023Updated 2 years ago
- A PoC for the dMSA Active Directory Domain Takeover deemed BadSuccessor☆54Mar 6, 2026Updated last month
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,369Jul 12, 2024Updated last year
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆370Feb 12, 2024Updated 2 years ago
- PoCs of RCEs against open source C2 servers☆92Sep 28, 2024Updated last year
- A small utility to translate NTDS.dit files to SQLite format.☆84Oct 11, 2023Updated 2 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆135Aug 20, 2018Updated 7 years ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,150Apr 10, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆189May 29, 2023Updated 2 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- Python version of the C# tool for "Shadow Credentials" attacks☆874Feb 14, 2026Updated 2 months ago
- Kerberoast with ACL abuse capabilities☆632Dec 16, 2024Updated last year
- ☆29Feb 16, 2022Updated 4 years ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆130Sep 7, 2023Updated 2 years ago
- splunksecrets is a tool for working with Splunk secrets offline☆80Jun 5, 2025Updated 10 months ago
- A very simple python script to encode and decode PowerShell one-liners.☆25Feb 13, 2022Updated 4 years ago
- ☆19Jan 25, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆738Sep 3, 2025Updated 7 months ago
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- Partial python implementation of SharpGPOAbuse☆542Mar 30, 2026Updated 2 weeks ago
- A terminal plugin to make Kali Linux objectively better - compatible with ohmyzsh☆18Jan 23, 2024Updated 2 years ago
- Collection of username lists for enumerating kerberos domain users☆107Dec 18, 2017Updated 8 years ago
- C# Data Collector for BloodHound☆1,244Apr 9, 2026Updated last week
- CVE-2023-33733 reportlab RCE☆121Sep 5, 2023Updated 2 years ago
- GameOver(lay) Ubuntu Privilege Escalation☆133Oct 9, 2023Updated 2 years ago
- A post-exploitation tool to decrypt SolarPutty's sessions files☆37Dec 8, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Malicious Macro Generator for LibreOffice/OpenOffice☆72Jan 11, 2023Updated 3 years ago
- Root shell PoC for CVE-2021-3156☆71Feb 3, 2021Updated 5 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,376Sep 22, 2025Updated 6 months ago
- ☆259Feb 17, 2023Updated 3 years ago
- Weaponizing for privileged file writes bugs with windows problem reporting☆249May 10, 2022Updated 3 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,301Aug 20, 2024Updated last year
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago