Binary and CrackMapExec module to impersonate tokens on a windows machine
☆44Jul 9, 2022Updated 3 years ago
Alternatives and similar repositories for Impersonate
Users that are interested in Impersonate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆482Nov 20, 2022Updated 3 years ago
- ☆17Jul 1, 2022Updated 3 years ago
- Discovery will gather DNS entry, subdomains and domains linked, all files publicly exposed to gather metadatas, check for dumps on Pasteb…☆14Mar 18, 2019Updated 7 years ago
- implementation of ADS-B protocol in ruby☆11Aug 31, 2021Updated 4 years ago
- Zipper, a CobaltStrike file and folder compression utility.☆223Jan 18, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Rusty Impersonate☆104Oct 15, 2025Updated 5 months ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆416Jan 27, 2024Updated 2 years ago
- ☆18Nov 4, 2021Updated 4 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆364Dec 13, 2025Updated 4 months ago
- A windows token impersonation tool☆322Apr 19, 2023Updated 2 years ago
- ☆51Jun 13, 2024Updated last year
- POC for frustrating/defeating Malware Analysts☆156Jun 12, 2022Updated 3 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆401Aug 15, 2025Updated 7 months ago
- ☆184Jul 2, 2022Updated 3 years ago
- SamrSearch can get user info and group info with MS-SAMR.☆15Feb 15, 2022Updated 4 years ago
- Obtain a clean-cut architecture at the launch of a mission and run some tests ( subdomain search, fuzzing, make screenshots on a given pe…☆25Jul 18, 2023Updated 2 years ago
- UPX - the Ultimate Packer for eXecutables☆68Mar 9, 2022Updated 4 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file con…☆27Mar 13, 2023Updated 3 years ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆33Jan 22, 2026Updated 2 months ago
- ☆173Mar 31, 2026Updated 2 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 计算ip范围,支持 cidr,ip-range 格式的输入☆23Sep 5, 2023Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆85May 7, 2023Updated 2 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆137Jan 22, 2025Updated last year
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- C# Lsass parser☆296Oct 13, 2021Updated 4 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆90Feb 16, 2022Updated 4 years ago
- Tool for efficient directory enumeration☆64Jan 27, 2026Updated 2 months ago
- CVE-2022-22980环境☆14Jul 14, 2022Updated 3 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆104Mar 30, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Beacon Object File Loader☆293Dec 3, 2023Updated 2 years ago
- CrackMapExec extension module/protocol support☆43Sep 12, 2023Updated 2 years ago
- ☆22Jun 21, 2022Updated 3 years ago
- Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading☆891Jul 21, 2020Updated 5 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Buggy script to play with GPOs☆122Dec 27, 2024Updated last year