Bash and ZSH integration for Impacket
☆73Nov 6, 2025Updated 3 months ago
Alternatives and similar repositories for impacket-shell-integration
Users that are interested in impacket-shell-integration are comparing it to the libraries listed below
Sorting:
- Generate and Manage KeyCredentialLinks☆248Jan 30, 2026Updated last month
- Tools for interacting with authentication packages using their individual message protocols☆403Feb 1, 2026Updated last month
- LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and r…☆384Apr 26, 2025Updated 10 months ago
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Nov 2, 2025Updated 4 months ago
- ☆234Oct 8, 2024Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Local SYSTEM auth trigger for relaying☆169Jul 22, 2025Updated 7 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Simple C# Redirector☆94Aug 31, 2025Updated 6 months ago
- ☆198Mar 28, 2025Updated 11 months ago
- WhoAmI by asking the LDAP service on a domain controller.☆64Feb 8, 2022Updated 4 years ago
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆309Feb 16, 2026Updated 2 weeks ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆191Apr 26, 2025Updated 10 months ago
- TokenCert☆102Nov 15, 2024Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- ☆94Dec 9, 2025Updated 2 months ago
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated 11 months ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆358Jan 8, 2026Updated last month
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆124Jan 17, 2026Updated last month
- Sniffing files generator☆61Feb 24, 2025Updated last year
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 5 months ago
- ☆64Jan 2, 2024Updated 2 years ago
- ☆137Feb 11, 2025Updated last year
- Exploits written while preparing for the OSED exam☆26Apr 30, 2024Updated last year
- ☆160May 5, 2025Updated 10 months ago
- ☆104Oct 27, 2022Updated 3 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆361Dec 13, 2025Updated 2 months ago
- Python tool for kidnapping Chrome cookies from a MacOS target☆22Oct 5, 2022Updated 3 years ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 4 months ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆51Nov 15, 2023Updated 2 years ago
- ☆53Sep 23, 2025Updated 5 months ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆1,033Dec 31, 2025Updated 2 months ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆568Jun 5, 2023Updated 2 years ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- ForsHops☆152Mar 25, 2025Updated 11 months ago