GeisericII / Winpacket
Impacket pre-compiled binaries
☆16Updated last year
Alternatives and similar repositories for Winpacket:
Users that are interested in Winpacket are comparing it to the libraries listed below
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆25Updated 3 months ago
- A python script that automates a C2 Profile build☆39Updated 3 weeks ago
- ☆41Updated last week
- A C# project that builds a Web Application which redirects all HTTPS☆24Updated 2 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- ☆29Updated 7 months ago
- A Python POC for CRED1 over SOCKS5☆147Updated 6 months ago
- a port of privkit bof for havoc☆23Updated last year
- CLI tool to interact with the BloodHound CE API☆45Updated 3 weeks ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 4 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆113Updated 3 weeks ago
- ☆50Updated 5 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆32Updated this week
- ☆54Updated 2 months ago
- ForsHops☆98Updated 3 weeks ago
- Lifetime AMSI bypass.☆35Updated 9 months ago
- Adversary Emulation Framework☆98Updated 8 months ago
- ☆55Updated 2 months ago
- Enumerate Domain Users Without Authentication☆31Updated 3 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆47Updated 2 months ago
- D/Invoke standalone shellcode runners☆37Updated last year
- Sniffing files generator☆54Updated last month
- Two in one, patch lifetime powershell console, no more etw and amsi!☆88Updated 9 months ago
- AzureAD beacon object files☆116Updated 4 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆32Updated last month
- 🧠 The ultimate, community-curated resource for Beacon Object Files (BOFs) — tutorials, how-tos, deep dives, and reference materials.☆38Updated this week
- Impersonate Tokens using only NTAPI functions☆61Updated 2 weeks ago
- Windows Thread Pool Injection Havoc Implementation☆28Updated last year
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆82Updated 7 months ago