Powershell version of SharpGPOAbuse
☆90May 21, 2021Updated 4 years ago
Alternatives and similar repositories for PowerGPOAbuse
Users that are interested in PowerGPOAbuse are comparing it to the libraries listed below
Sorting:
- Partial python implementation of SharpGPOAbuse☆523Nov 9, 2025Updated 3 months ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- Python version of the C# tool for "Shadow Credentials" attacks☆858Feb 14, 2026Updated 2 weeks ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,302Dec 15, 2020Updated 5 years ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆144Feb 23, 2022Updated 4 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,098Updated this week
- Precompiled executable☆63Feb 21, 2025Updated last year
- A tool to help query AD via the LDAP protocol☆608Sep 25, 2024Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆238Jan 26, 2022Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆839Dec 2, 2023Updated 2 years ago
- Impersonating authentication over HTTP and/or named pipes.☆145Apr 2, 2021Updated 4 years ago
- MS-FSRVP coercion abuse PoC☆303Dec 30, 2021Updated 4 years ago
- Powerview on steroids☆875Updated this week
- Create file system symbolic links from low privileged user accounts within PowerShell☆95Jun 20, 2022Updated 3 years ago
- ☆14Dec 5, 2024Updated last year
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆138May 30, 2022Updated 3 years ago
- CLI monitor for windows process- & file activity☆97Nov 20, 2020Updated 5 years ago
- ☆36Nov 26, 2024Updated last year
- pyForgeCert is a Python equivalent of the ForgeCert.☆69Aug 15, 2023Updated 2 years ago
- Compiled Binaries for Ghostpack☆1,604Oct 24, 2024Updated last year
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- rcat☆75Mar 7, 2022Updated 3 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆179Feb 14, 2023Updated 3 years ago
- Tools for Kerberos PKINIT and relaying to AD CS☆882Jan 3, 2025Updated last year
- C# implementation of harmj0y's PowerView☆1,086Mar 22, 2024Updated last year
- Tool for Active Directory Certificate Services enumeration and abuse☆3,401Feb 18, 2026Updated last week
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆468May 16, 2024Updated last year
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆135May 25, 2023Updated 2 years ago
- TCP Port Redirection Utility☆762Jan 31, 2023Updated 3 years ago
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,341Jul 12, 2024Updated last year
- A C# utility for interacting with SCCM☆682Aug 20, 2025Updated 6 months ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆187Jun 22, 2022Updated 3 years ago