t0thkr1s / gpp-decrypt
Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.
☆98Updated 2 years ago
Alternatives and similar repositories for gpp-decrypt:
Users that are interested in gpp-decrypt are comparing it to the libraries listed below
- Powershell script to extract information from boot PXE☆139Updated 5 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆71Updated 6 years ago
- C# implementation of harmj0y's PowerView☆25Updated 4 years ago
- ☆211Updated 2 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆263Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆68Updated 6 months ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆228Updated last year
- ADCS abuser☆275Updated 2 years ago
- Kerberoast with ACL abuse capabilities☆420Updated 2 months ago
- Make everyone in your VLAN ASRep roastable☆184Updated 2 weeks ago
- generate payloads that force authentication against an attacker machine☆104Updated 2 years ago
- A cheatsheet for NetExec☆112Updated last month
- Password spraying tool and Bloodhound integration☆226Updated 2 months ago
- Aspx reverse shell☆104Updated 5 years ago
- Custom Queries - Brought Up to BH4.1 syntax☆244Updated 4 months ago
- Dumping LAPS from Python☆260Updated 2 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆142Updated last year
- ☆102Updated last year
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆147Updated 2 years ago
- CLI monitor for windows process- & file activity☆83Updated 4 years ago
- GitLab User Enumeration☆26Updated 2 months ago
- Impacket is a collection of Python classes for working with network protocols.☆278Updated 2 months ago
- Partial python implementation of SharpGPOAbuse☆403Updated last year
- ☆74Updated 5 years ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆56Updated 2 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆112Updated 4 years ago
- Squid Pivoting Open Port Scanner☆62Updated 3 months ago
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆137Updated 8 months ago
- SSTI Payload Generator☆89Updated 2 years ago
- Extracts Key Values from .keytab files☆247Updated 4 years ago