Powershell version of SharpGPOAbuse
☆90May 21, 2021Updated 4 years ago
Alternatives and similar repositories for PowerGPOAbuse
Users that are interested in PowerGPOAbuse are comparing it to the libraries listed below
Sorting:
- Partial python implementation of SharpGPOAbuse☆531Mar 7, 2026Updated 2 weeks ago
- Precompiled executable☆63Feb 21, 2025Updated last year
- Python version of the C# tool for "Shadow Credentials" attacks☆864Feb 14, 2026Updated last month
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,313Dec 15, 2020Updated 5 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,122Feb 27, 2026Updated 3 weeks ago
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆144Feb 23, 2022Updated 4 years ago
- A tool to help query AD via the LDAP protocol☆614Sep 25, 2024Updated last year
- Impersonating authentication over HTTP and/or named pipes.☆144Apr 2, 2021Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆239Jan 26, 2022Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆840Dec 2, 2023Updated 2 years ago
- Compiled Binaries for Ghostpack☆1,616Oct 24, 2024Updated last year
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆135May 25, 2023Updated 2 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆437Jul 29, 2013Updated 12 years ago
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- C# implementation of harmj0y's PowerView☆1,092Mar 22, 2024Updated last year
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- Tools for Kerberos PKINIT and relaying to AD CS☆887Jan 3, 2025Updated last year
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- Powerview on steroids☆903Mar 10, 2026Updated last week
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆733Sep 3, 2025Updated 6 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆3,427Feb 28, 2026Updated 3 weeks ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆139May 30, 2022Updated 3 years ago
- CLI monitor for windows process- & file activity☆97Nov 20, 2020Updated 5 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,451Dec 18, 2022Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆440Jan 4, 2025Updated last year
- ☆409Updated this week
- Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)☆1,094Jul 5, 2021Updated 4 years ago
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆477May 16, 2024Updated last year
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,351Jul 12, 2024Updated last year
- pyForgeCert is a Python equivalent of the ForgeCert.☆69Aug 15, 2023Updated 2 years ago
- Tool to start processes as SYSTEM using token duplication☆37Oct 27, 2020Updated 5 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆90Feb 16, 2022Updated 4 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- Active Directory ACL exploitation with BloodHound☆756Nov 18, 2021Updated 4 years ago