Binary and CrackMapExec module to impersonate tokens on a windows machine
☆44Jul 9, 2022Updated 3 years ago
Alternatives and similar repositories for Impersonate
Users that are interested in Impersonate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆479Nov 20, 2022Updated 3 years ago
- ☆17Jul 1, 2022Updated 3 years ago
- implementation of ADS-B protocol in ruby☆11Aug 31, 2021Updated 4 years ago
- Zipper, a CobaltStrike file and folder compression utility.☆222Jan 18, 2020Updated 6 years ago
- Rusty Impersonate☆104Oct 15, 2025Updated 5 months ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆418Jan 27, 2024Updated 2 years ago
- ☆18Nov 4, 2021Updated 4 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆361Dec 13, 2025Updated 3 months ago
- A windows token impersonation tool☆322Apr 19, 2023Updated 2 years ago
- ☆51Jun 13, 2024Updated last year
- POC for frustrating/defeating Malware Analysts☆156Jun 12, 2022Updated 3 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆399Aug 15, 2025Updated 7 months ago
- ☆184Jul 2, 2022Updated 3 years ago
- SamrSearch can get user info and group info with MS-SAMR.☆15Feb 15, 2022Updated 4 years ago
- Obtain a clean-cut architecture at the launch of a mission and run some tests ( subdomain search, fuzzing, make screenshots on a given pe…☆25Jul 18, 2023Updated 2 years ago
- UPX - the Ultimate Packer for eXecutables☆68Mar 9, 2022Updated 4 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file con…☆27Mar 13, 2023Updated 3 years ago
- ☆171Feb 27, 2026Updated 3 weeks ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆31Jan 22, 2026Updated 2 months ago
- 计算ip范围,支持 cidr,ip-range 格式的输入☆23Sep 5, 2023Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆85May 7, 2023Updated 2 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆137Jan 22, 2025Updated last year
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- C# Lsass parser☆296Oct 13, 2021Updated 4 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆90Feb 16, 2022Updated 4 years ago
- Tool for efficient directory enumeration☆64Jan 27, 2026Updated last month
- CVE-2022-22980环境☆14Jul 14, 2022Updated 3 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆103Mar 30, 2025Updated 11 months ago
- Beacon Object File Loader☆293Dec 3, 2023Updated 2 years ago
- CrackMapExec extension module/protocol support☆43Sep 12, 2023Updated 2 years ago
- ☆22Jun 21, 2022Updated 3 years ago
- Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading☆889Jul 21, 2020Updated 5 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Buggy script to play with GPOs☆122Dec 27, 2024Updated last year
- Command line tool to fetch, decode and brute-force CodeIgniter session cookies by guessing and bruteforcing secret keys.☆16Jan 31, 2025Updated last year