dadevel / impacket-zsh-integrationLinks
ZSH integration for Impacket
☆61Updated 5 months ago
Alternatives and similar repositories for impacket-zsh-integration
Users that are interested in impacket-zsh-integration are comparing it to the libraries listed below
Sorting:
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆77Updated 2 weeks ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆74Updated last year
- ☆56Updated 5 months ago
- ☆52Updated 5 months ago
- ☆68Updated 2 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆50Updated 7 months ago
- Microsoft Graph API post-exploitation toolkit☆94Updated last year
- ☆50Updated 8 months ago
- Advanced In-Memory PowerShell Process Injection Framework☆64Updated this week
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆119Updated 3 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆75Updated 2 years ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆122Updated 9 months ago
- Python tool to interact with WMI StdRegProv☆60Updated 8 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- Permanently disable EDRs as local admin☆58Updated 2 weeks ago
- Deploy a phishing infrastructure on the fly.☆71Updated 6 months ago
- Get Fine Grained Password Policy☆70Updated 3 months ago
- Tool to aid in dumping LSASS process remotely☆40Updated 11 months ago
- ☆44Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 7 months ago
- ☆89Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 4 months ago
- Validates priv escalation of AD trusts☆45Updated 3 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆57Updated last week
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Updated last year
- .NET deserialization hunter☆77Updated 11 months ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆70Updated 2 years ago
- Sniffing files generator☆59Updated 4 months ago
- Lateral Movement☆124Updated last year
- TokenCert☆98Updated 8 months ago