whitel1st / GP_HijackLinks
Group Policy Hijacking
☆31Updated 7 years ago
Alternatives and similar repositories for GP_Hijack
Users that are interested in GP_Hijack are comparing it to the libraries listed below
Sorting:
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- Mimikatz HashClash☆12Updated 10 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 6 years ago
- ☆1Updated 6 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 4 years ago
- ☆17Updated 7 years ago
- AWS S3 Bucket/Object Finder☆24Updated 7 years ago
- ☆20Updated 5 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 7 years ago
- Issues to consider when planning a red team exercise.☆15Updated 7 years ago
- Enumerate RIDs using pure Python☆31Updated 10 months ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- Random source codes☆25Updated 4 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- ☆25Updated 6 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆45Updated 8 years ago
- Alphanumeric Encoder☆25Updated 6 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Updated 6 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Updated 8 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 7 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- SysCon14 release☆53Updated 7 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- ☆24Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- ☆19Updated 8 years ago