Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.
-
Updated
Aug 26, 2022 - Python
Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.
Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI, scans SMB/NFS shares for passwords, scans for remote accesses, dumps NTDS.dit.
Add a description, image, and links to the gpp-decrypt topic page so that developers can more easily learn about it.
To associate your repository with the gpp-decrypt topic, visit your repo's landing page and select "manage topics."