nccgroup / GTFOBLookup
Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Project/LOLBAS), WADComs (https://wadcoms.github.io), and HijackLibs (https://hijacklibs.net/).
☆276Updated last year
Alternatives and similar repositories for GTFOBLookup:
Users that are interested in GTFOBLookup are comparing it to the libraries listed below
- ☆158Updated 3 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆247Updated 2 years ago
- Active Directory ACL exploitation with BloodHound☆716Updated 3 years ago
- ☆151Updated 2 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆140Updated 3 years ago
- ☆135Updated 10 months ago
- An script to perform kerberos bruteforcing by using impacket☆445Updated 2 years ago
- NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The …☆334Updated last year
- Dumping LAPS from Python☆262Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆549Updated last year
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆530Updated 2 years ago
- MS17-010☆270Updated 2 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆370Updated 3 years ago
- Changes for Visual Studio 2013☆115Updated 9 years ago
- Standalone binaries for Linux/Windows of Impacket's examples☆727Updated last year
- Powershell crazy and sometimes diabolic scripts☆154Updated 4 years ago
- ☆392Updated 4 years ago
- Kerberoast attack -pure python-☆427Updated last year
- Juicy Potato for x86 Windows☆118Updated 5 years ago
- NTLMv1 Multitool☆611Updated last week
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆516Updated 2 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆265Updated last year
- Linux PAM Backdoor☆322Updated last year
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆603Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆227Updated 3 years ago
- Collection of things made during my OSCP journey☆257Updated 7 years ago
- ☆165Updated 4 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆116Updated 2 years ago
- Windows Kernel Exploits☆66Updated 7 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆476Updated 9 months ago