nccgroup / GTFOBLookup
Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Project/LOLBAS), WADComs (https://wadcoms.github.io), and HijackLibs (https://hijacklibs.net/).
☆277Updated last year
Alternatives and similar repositories for GTFOBLookup:
Users that are interested in GTFOBLookup are comparing it to the libraries listed below
- ☆158Updated 3 years ago
- An script to perform kerberos bruteforcing by using impacket☆446Updated 3 years ago
- MS17-010☆270Updated 2 years ago
- Powershell crazy and sometimes diabolic scripts☆155Updated 4 years ago
- Changes for Visual Studio 2013☆117Updated 9 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆142Updated 3 years ago
- Juicy Potato for x86 Windows☆120Updated 5 years ago
- ☆157Updated last week
- Active Directory ACL exploitation with BloodHound☆723Updated 3 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆250Updated 2 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆530Updated 2 years ago
- NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The …☆339Updated last year
- Collection of things made during my OSCP journey☆259Updated 7 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆118Updated 3 years ago
- ☆139Updated 11 months ago
- linikatz is a tool to attack AD on UNIX☆552Updated last year
- Dumping LAPS from Python☆267Updated 2 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆477Updated 4 years ago
- Windows Kernel Exploits☆66Updated 7 years ago
- ☆216Updated 4 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆517Updated 2 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- Bypass for PowerShell Constrained Language Mode☆389Updated 3 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆274Updated last year
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆612Updated 4 years ago
- project-blacklist3r☆537Updated last month
- getsystem via parent process using ps1 & embeded c#☆406Updated last year
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆773Updated 2 years ago
- Proof of Concept for CVE-2019-18634☆211Updated 3 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆375Updated 4 years ago