Windows Security Descriptor Definition Language (SDDL) parser and formatter
☆20Jun 8, 2020Updated 5 years ago
Alternatives and similar repositories for winsddl
Users that are interested in winsddl are comparing it to the libraries listed below
Sorting:
- General scripts that gather information out of Active Directory☆16Jun 9, 2022Updated 3 years ago
- ☆20Jan 10, 2025Updated last year
- Tool to convert SDDL to readable text☆43Apr 25, 2018Updated 7 years ago
- A plugin for ILSpy that loads references that have been embedded as resources with Costura.☆23Aug 8, 2021Updated 4 years ago
- This is a proof-of-work for abusing "fsmonitor" against IDE.☆42Nov 22, 2025Updated 3 months ago
- The home of the SDDLMaker☆28Jan 13, 2025Updated last year
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆21Aug 23, 2024Updated last year
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- ☆29Aug 19, 2020Updated 5 years ago
- a port of privkit bof for havoc☆23Dec 8, 2023Updated 2 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Sep 1, 2023Updated 2 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- Impacket is a collection of Python classes for working with network protocols.☆31Jun 27, 2024Updated last year
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆121Sep 2, 2025Updated 6 months ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Nov 11, 2016Updated 9 years ago
- Abuse Azure API permissions for red teaming☆71Jan 24, 2023Updated 3 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- Terraform config to spin up a domain controller and some member servers in azure☆33Apr 11, 2022Updated 3 years ago
- Proof of concept for Kerberos Armoring abuse.☆81Dec 12, 2025Updated 2 months ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆80Nov 6, 2025Updated 4 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆86Dec 17, 2025Updated 2 months ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- ☆14Dec 11, 2025Updated 2 months ago
- ManageEngine OpManager Decryption Tools☆32Sep 6, 2022Updated 3 years ago
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago
- A timestamp and date decoder written for python 3☆41Jan 22, 2026Updated last month
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Aug 11, 2024Updated last year
- Updated version of n0kovo's Rule List☆44Jan 29, 2026Updated last month
- Windows and macOS Hardening Interface to make security more accessible.☆37Jan 24, 2022Updated 4 years ago
- ☆14Feb 11, 2026Updated 3 weeks ago
- Picture encryption application for Sailfish OS☆10Nov 10, 2025Updated 3 months ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Simple program that hide/show the icons of Windows desktop.☆11Sep 29, 2023Updated 2 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- Stay tuned... dual screen flip handheld? Or something like that.☆14Feb 8, 2026Updated last month
- ☆12Jul 15, 2016Updated 9 years ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 10 months ago