rootSySdk / PowerGPOAbuse
Powershell version of SharpGPOAbuse
☆75Updated 3 years ago
Alternatives and similar repositories for PowerGPOAbuse:
Users that are interested in PowerGPOAbuse are comparing it to the libraries listed below
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆83Updated 3 years ago
- DCSync Attack from Outside using Impacket☆112Updated 3 years ago
- ☆159Updated 6 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆137Updated last year
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆129Updated last year
- Simple C# implementation of PowerUpSQL☆95Updated 10 months ago
- ☆86Updated last year
- C# version of Powermad☆165Updated last year
- ADCS cert template modification and ACL enumeration☆136Updated last year
- ☆224Updated last year
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆122Updated 3 years ago
- POC tools for exploring SMB over QUIC protocol☆123Updated 3 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆154Updated last year
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆101Updated 2 years ago
- Extendable payload obfuscation and delivery framework☆143Updated 2 years ago
- Active Directory password spraying tool. Auto fetches user list and avoids potential lockouts.☆130Updated 3 years ago
- Perform DCSync operation without mimikatz☆144Updated 6 months ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆90Updated last year
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆184Updated 2 years ago
- Buggy script to play with GPOs☆97Updated 4 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆174Updated 2 years ago
- To audit the security of read-only domain controllers☆115Updated last year
- ☆117Updated last month
- Get Fine Grained Password Policy☆70Updated 3 weeks ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆256Updated 2 years ago
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆135Updated 2 years ago
- ACL abuse swiss-knife☆123Updated 2 years ago
- ☆141Updated 3 years ago
- MSSQL Database Attacker tool☆189Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆143Updated 4 years ago