B-Sides CBR 2018 talk about group policy and Grouper
☆38May 3, 2019Updated 6 years ago
Alternatives and similar repositories for Get-GPTrashfire
Users that are interested in Get-GPTrashfire are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Various scripts to help you out. Mostly very scrappy, but functional. I realise Write-Host is not the way to do things, but I wrote som…☆27May 13, 2022Updated 3 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- Group Policy Hijacking☆32Apr 6, 2018Updated 7 years ago
- Script for auditing whitelist and finding fronted domains and loosely typed regular expressions.☆13Dec 25, 2017Updated 8 years ago
- ☆20Jun 25, 2019Updated 6 years ago
- A simple utility to list all methods of a given .NET Assembly and to invoke them☆75Sep 21, 2021Updated 4 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Jan 31, 2019Updated 7 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆57Apr 13, 2024Updated last year
- Windows Event Forwarding for Active Directory Security Logs☆29Jun 28, 2016Updated 9 years ago
- ☆45Nov 5, 2018Updated 7 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- Shell script for converting an input file containing one or more sslscan results into HTML tables.☆13Jul 1, 2020Updated 5 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- ☆59May 1, 2019Updated 6 years ago
- A simple Python SSH server that reveals passwords of connecting clients☆32Jul 7, 2017Updated 8 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 9 years ago
- A repo for holding cheat sheets for myself that cover various penetration testing tools and commands.☆41May 21, 2018Updated 7 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆198Jun 1, 2018Updated 7 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- ☆98Mar 16, 2016Updated 10 years ago
- ☆229May 10, 2018Updated 7 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- locate and attack Lync/Skype for Business☆345Oct 1, 2024Updated last year
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago