nccgroup / GTFOBLookupLinks
Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Project/LOLBAS), WADComs (https://wadcoms.github.io), and HijackLibs (https://hijacklibs.net/).
☆281Updated 2 years ago
Alternatives and similar repositories for GTFOBLookup
Users that are interested in GTFOBLookup are comparing it to the libraries listed below
Sorting:
- NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The …☆356Updated last year
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆254Updated 2 years ago
- ☆160Updated 3 years ago
- Changes for Visual Studio 2013☆118Updated 10 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆144Updated 4 years ago
- An script to perform kerberos bruteforcing by using impacket☆452Updated 3 years ago
- ☆165Updated 3 months ago
- Linux PAM Backdoor☆342Updated last year
- linikatz is a tool to attack AD on UNIX☆570Updated last year
- Powershell crazy and sometimes diabolic scripts☆157Updated 4 years ago
- Juicy Potato for x86 Windows☆122Updated 5 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆490Updated last year
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆385Updated 4 years ago
- Active Directory ACL exploitation with BloodHound☆733Updated 3 years ago
- ☆147Updated last year
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆381Updated 8 months ago
- MS17-010☆272Updated 2 years ago
- Kerberoast attack -pure python-☆438Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆234Updated 3 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆129Updated 3 years ago
- Windows Kernel Exploits☆66Updated 7 years ago
- Dumping LAPS from Python☆274Updated 2 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆267Updated last year
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆553Updated 3 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 4 years ago
- IOXIDResolver.py from AirBus Security☆255Updated last year
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆231Updated 2 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆303Updated 2 years ago