cogiceo / GPOHound
Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data
☆101Updated this week
Alternatives and similar repositories for GPOHound:
Users that are interested in GPOHound are comparing it to the libraries listed below
- Tool for Active Directory Certificate Services enumeration and abuse☆150Updated last week
- Weaponizing DCOM for NTLM Authentication Coercions☆206Updated 2 weeks ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆197Updated 2 months ago
- ☆215Updated 6 months ago
- Windows remote execution multitool☆79Updated this week
- Continuous password spraying tool☆181Updated last month
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆145Updated last week
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆112Updated 3 weeks ago
- Azure Post Exploitation Framework☆197Updated last month
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆198Updated 6 months ago
- ☆201Updated last year
- Parses Snaffler output file and generate beautified outputs.☆93Updated 3 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆100Updated 5 months ago
- ☆83Updated 3 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆205Updated 2 weeks ago
- Make everyone in your VLAN ASRep roastable☆186Updated last month
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆152Updated 3 months ago
- A Python POC for CRED1 over SOCKS5☆147Updated 6 months ago
- C2 Infrastructure Automation☆98Updated last month
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆161Updated 4 months ago
- ☆117Updated 3 weeks ago
- Adversary Emulation Framework☆98Updated 9 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆163Updated 4 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆128Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆113Updated 11 months ago
- Automatically run and populate a new instance of BH CE☆73Updated 3 weeks ago
- psexecsvc - a python implementation of PSExec's native service implementation☆195Updated 2 months ago
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆164Updated last week
- Generate and Manage KeyCredentialLinks☆151Updated last week
- ☆29Updated 7 months ago