☆527Sep 15, 2022Updated 3 years ago
Alternatives and similar repositories for Invoke-ACLPwn
Users that are interested in Invoke-ACLPwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Active Directory ACL exploitation with BloodHound☆762Nov 18, 2021Updated 4 years ago
- Exchange privilege escalations to Active Directory☆813Apr 23, 2023Updated 3 years ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,124May 29, 2024Updated last year
- PowerShell MachineAccountQuota and DNS exploit tools☆1,462Jan 11, 2023Updated 3 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆382Jul 25, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,325Dec 15, 2020Updated 5 years ago
- C# implementation of harmj0y's PowerView☆1,098Mar 22, 2024Updated 2 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,660Oct 11, 2018Updated 7 years ago
- PowerShell Pass The Hash Utils☆1,764Dec 9, 2018Updated 7 years ago
- A tool to elevate privilege with Windows Tokens☆1,068Oct 6, 2023Updated 2 years ago
- SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader☆1,318Oct 1, 2019Updated 6 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,128Dec 7, 2022Updated 3 years ago
- ☆351Feb 21, 2022Updated 4 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆817Aug 28, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Run PowerShell command without invoking powershell.exe☆1,550Apr 9, 2026Updated last month
- ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the…☆1,913Jun 15, 2020Updated 5 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 6 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,964Nov 19, 2025Updated 6 months ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,124Feb 10, 2021Updated 5 years ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,599Mar 11, 2026Updated 2 months ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,639Jul 10, 2023Updated 2 years ago
- A script for advanced discovery of Privileged Accounts - includes Shadow Admins☆829Sep 9, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Run PowerShell with rundll32. Bypass software restrictions.☆1,826Mar 17, 2021Updated 5 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆1,871Aug 12, 2021Updated 4 years ago
- A little toolbox to play with Microsoft Kerberos in C☆1,520Dec 14, 2021Updated 4 years ago
- SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.☆1,421Jun 27, 2024Updated last year
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,446Jul 20, 2024Updated last year
- PSAmsi is a tool for auditing and defeating AMSI signatures.☆398Apr 22, 2018Updated 8 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,016Jul 3, 2018Updated 7 years ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆493Feb 16, 2019Updated 7 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,320Nov 22, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A Python based ingestor for BloodHound☆2,392Oct 24, 2025Updated 6 months ago
- Payload Generation Framework☆1,981Aug 21, 2024Updated last year
- Find vulnerabilities in AD Group Policy☆642Mar 25, 2022Updated 4 years ago
- Process Injection☆767Oct 24, 2021Updated 4 years ago
- ☆281Dec 30, 2020Updated 5 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆180Oct 21, 2018Updated 7 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆2,715Dec 12, 2024Updated last year