nccgroup / GTFOBLookupLinks
Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Project/LOLBAS), WADComs (https://wadcoms.github.io), and HijackLibs (https://hijacklibs.net/).
☆284Updated 2 years ago
Alternatives and similar repositories for GTFOBLookup
Users that are interested in GTFOBLookup are comparing it to the libraries listed below
Sorting:
- NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The …☆382Updated 2 years ago
- Changes for Visual Studio 2013☆118Updated 10 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆255Updated 3 years ago
- ☆164Updated 3 years ago
- ☆184Updated 8 months ago
- An script to perform kerberos bruteforcing by using impacket☆456Updated 3 years ago
- Powershell crazy and sometimes diabolic scripts☆159Updated 5 years ago
- linikatz is a tool to attack AD on UNIX☆586Updated 2 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆78Updated 4 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆145Updated 4 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆500Updated 3 months ago
- Linux PAM Backdoor☆356Updated 2 years ago
- Windows Kernel Exploits☆69Updated 8 years ago
- Kerberoast attack -pure python-☆436Updated 2 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆141Updated 3 years ago
- Juicy Potato for x86 Windows☆129Updated 6 years ago
- Active Directory ACL exploitation with BloodHound☆750Updated 4 years ago
- ☆158Updated 3 months ago
- MS17-010☆272Updated 3 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆397Updated 4 years ago
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆380Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆237Updated 3 years ago
- Dumping LAPS from Python☆284Updated 3 years ago
- Proof of Concept for CVE-2019-18634☆232Updated 4 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆587Updated 4 months ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 4 years ago
- Using this script, you can enumerate Usernames and passwords of Nosql(mongodb) injecion vulnerable web applications.☆173Updated 6 years ago
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆228Updated 4 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆47Updated 2 years ago
- IOXIDResolver.py from AirBus Security☆263Updated 2 years ago