t0thkr1s / gpp-decrypt
Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.
☆103Updated 2 years ago
Alternatives and similar repositories for gpp-decrypt:
Users that are interested in gpp-decrypt are comparing it to the libraries listed below
- Powershell script to extract information from boot PXE☆139Updated 5 years ago
- C# implementation of harmj0y's PowerView☆25Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆69Updated 7 months ago
- generate payloads that force authentication against an attacker machine☆105Updated 2 years ago
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆149Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆278Updated 2 months ago
- Password spraying tool and Bloodhound integration☆229Updated 2 months ago
- ☆215Updated 2 years ago
- CLI monitor for windows process- & file activity☆83Updated 4 years ago
- Kerberoast with ACL abuse capabilities☆421Updated 3 months ago
- Make everyone in your VLAN ASRep roastable☆185Updated 3 weeks ago
- Precompiled executable☆50Updated last month
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆72Updated 6 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆265Updated last year
- A cheatsheet for NetExec☆114Updated last month
- ADCS abuser☆276Updated 2 years ago
- Aspx reverse shell☆105Updated 5 years ago
- Dumping LAPS from Python☆262Updated 2 years ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆230Updated last year
- ☆75Updated 5 years ago
- A collection of code snippets built to assist with breaking chains.☆118Updated 11 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆287Updated 4 months ago
- Python setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆97Updated 4 months ago
- Partial python implementation of SharpGPOAbuse☆407Updated last year
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆56Updated 2 years ago
- Collection of username lists for enumerating kerberos domain users☆89Updated 7 years ago
- Identifies the bytes that Microsoft Defender flags on.☆84Updated 2 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆141Updated last year
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆121Updated last year