t0thkr1s / gpp-decrypt
Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.
☆113Updated 2 years ago
Alternatives and similar repositories for gpp-decrypt:
Users that are interested in gpp-decrypt are comparing it to the libraries listed below
- Impacket is a collection of Python classes for working with network protocols.☆280Updated 4 months ago
- Powershell script to extract information from boot PXE☆139Updated 6 years ago
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆153Updated 2 years ago
- Make everyone in your VLAN ASRep roastable☆190Updated 2 months ago
- C# implementation of harmj0y's PowerView☆25Updated 5 years ago
- Timeroasting scripts by Tom Tervoort☆282Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆300Updated 5 months ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆329Updated 2 weeks ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆241Updated last month
- Password spraying tool and Bloodhound integration☆232Updated 4 months ago
- Kerberoast with ACL abuse capabilities☆452Updated 4 months ago
- winPEAS, but for Active Directory☆150Updated last month
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆276Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆71Updated 8 months ago
- Custom Queries - Brought Up to BH4.1 syntax☆251Updated last week
- ☆220Updated 2 years ago
- A cheatsheet for NetExec☆119Updated 3 months ago
- Aspx reverse shell☆106Updated 5 years ago
- AD ACL abuse☆312Updated last month
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆85Updated 6 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆195Updated 2 months ago
- Precompiled executable☆53Updated 2 months ago
- generate payloads that force authentication against an attacker machine☆106Updated 2 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆143Updated last year
- ADCS abuser☆279Updated 2 years ago
- CLI monitor for windows process- & file activity☆87Updated 4 years ago
- Partial python implementation of SharpGPOAbuse☆421Updated last year
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆57Updated 2 years ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆128Updated last year
- ☆79Updated 5 years ago