Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service loaders, set descriptions, and run them on demand.
☆121Dec 7, 2025Updated 5 months ago
Alternatives and similar repositories for impacket-jump
Users that are interested in impacket-jump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆47Feb 6, 2026Updated 3 months ago
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and …☆118Mar 6, 2026Updated 2 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆46Jun 23, 2025Updated 10 months ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Apr 2, 2026Updated last month
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆204Apr 21, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆136Aug 23, 2025Updated 8 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 10 months ago
- ☆164May 5, 2025Updated last year
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 6 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆189Mar 14, 2025Updated last year
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆168Nov 2, 2025Updated 6 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 4 months ago
- Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames☆155Nov 23, 2025Updated 5 months ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆48Oct 3, 2025Updated 7 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆235Oct 8, 2024Updated last year
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆96Jan 2, 2026Updated 4 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 4 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 9 months ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 10 months ago
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆34Jul 5, 2025Updated 10 months ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆44Jun 27, 2023Updated 2 years ago
- EDR-Redir : a tool used to redirect the EDR's folder to another location.☆232Nov 6, 2025Updated 6 months ago
- A technique for Active Directory domain persistence☆39May 31, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆103Jan 10, 2026Updated 3 months ago
- ☆57Nov 18, 2025Updated 5 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆65Jan 21, 2025Updated last year
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆210Nov 18, 2025Updated 5 months ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆286Apr 17, 2023Updated 3 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Let's make quick work of GraphQL instances ;)☆26Mar 8, 2026Updated 2 months ago
- ☆50Jun 4, 2025Updated 11 months ago
- Tool to perform lateral movement between AAD joined devices☆66Jun 8, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A cmake template for crystal palace☆40Dec 20, 2025Updated 4 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆162Jan 3, 2026Updated 4 months ago
- Attempt at Obfuscated version of SharpCollection☆259Nov 15, 2025Updated 5 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 4 months ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated 2 months ago
- Impacket☆50Feb 25, 2026Updated 2 months ago
- Utilizng an MCP Server to communicate with your C2☆91May 15, 2025Updated 11 months ago