whitel1st / GP_HijackLinks
Group Policy Hijacking
☆31Updated 7 years ago
Alternatives and similar repositories for GP_Hijack
Users that are interested in GP_Hijack are comparing it to the libraries listed below
Sorting:
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 4 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Updated 8 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆46Updated 8 years ago
- \ PowerAvails Powershell /☆12Updated 7 years ago
- AV Bypass☆29Updated 7 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- Mimikatz HashClash☆12Updated 10 years ago
- ☆30Updated 6 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated last year
- Burp extension to decode NTLM SSP headers and extract domain/host information☆32Updated 4 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 6 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- Random source codes☆25Updated 5 years ago
- ☆1Updated 6 years ago
- SysCon14 release☆53Updated 8 years ago
- Misc stuff☆10Updated 10 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Updated 6 years ago
- ☆17Updated 7 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- ☆20Updated 5 years ago
- the Open Source Windows Privilege Escalation Guide☆10Updated 8 years ago
- ☆23Updated 10 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago