Gpp Decrypt Save

Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.

Project README

gpp-decrypt

made-with-python built-with-love

Note: The idea is heavily based on this project: https://github.com/BustedSec/gpp-decrypt

This tool is written in Python 3 to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.

Download

git clone https://github.com/t0thkr1s/gpp-decrypt

Install

The script has only 2 dependencies:

You can install these by typing:

python3 setup.py install

Run

python3 gpp-decrypt.py -f [groups.xml]

or

python3 gpp-decrypt.py -c [cpassword]

Screenshot

Screenshot

Disclaimer

This tool is only for testing and academic purposes and can only be used where strict consent has been given. Do not use it for illegal purposes! It is the end user’s responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this tool and software.

License

This project is licensed under the GPLv3 License - see the LICENSE file for details

Open Source Agenda is not affiliated with "Gpp Decrypt" Project. README Source: t0thkr1s/gpp-decrypt

Open Source Agenda Badge

Open Source Agenda Rating