qtc-de / wconv
wconv - Converting Windows native formats into human readable form
☆36Updated 3 weeks ago
Alternatives and similar repositories for wconv:
Users that are interested in wconv are comparing it to the libraries listed below
- Python DPAPI NG Decryptor for non-Windows Platforms☆62Updated 4 months ago
- ☆54Updated last year
- Tool to convert SDDL to readable text☆40Updated 7 years ago
- LDAP Querying without the Suck☆100Updated 5 months ago
- Python based BloodHound data importer☆147Updated last year
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆97Updated last year
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆66Updated 4 years ago
- Leghorn code for PKI abuse☆32Updated 3 years ago
- A Powershell module that helps you identify AppLocker weaknesses☆168Updated 5 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- PoSh BloodHound Dog Whisperer☆191Updated last year
- BloodHound Data Scanner☆45Updated 4 years ago
- Windows Security Descriptor Definition Language (SDDL) parser and formatter☆16Updated 4 years ago
- This repo is dedicated to a powerpoint exploit☆35Updated 4 years ago
- InfoSec Notes☆56Updated last year
- ☆89Updated 4 years ago
- Material for the "Hands-On BloodHound" Workshop☆108Updated 4 years ago
- GolenGMSA tool for working with GMSA passwords☆145Updated last year
- DPAPILAB Next Gen, script collection☆82Updated 2 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆187Updated 3 years ago
- ☆108Updated 3 years ago
- Tool to perform lateral movement between AAD joined devices☆60Updated 2 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- ☆37Updated last year
- An Ansible collection that installs an SCCM deployment with optional configurations.☆78Updated 2 weeks ago
- ☆35Updated 2 years ago
- ☆76Updated 3 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆90Updated last year
- Eating 2FA for Breakfast☆58Updated 2 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago