msImpersonate - User account impersonation written in pure Python3
☆108May 17, 2022Updated 4 years ago
Alternatives and similar repositories for msImpersonate
Users that are interested in msImpersonate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python3 o365 User Enumeration Tool☆570Jan 28, 2026Updated 3 months ago
- LDAP enumeration tool implemented in Python3☆225May 20, 2025Updated last year
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆360Oct 22, 2024Updated last year
- Registry timestamp manipulation☆17Feb 26, 2014Updated 12 years ago
- MayorSec DNS Enumeration Tool☆91Nov 30, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Internal Network Penetration Test Playbook☆17Apr 18, 2022Updated 4 years ago
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆20Oct 24, 2022Updated 3 years ago
- Impacket☆50Feb 25, 2026Updated 2 months ago
- Koppeling x Metatwin x LazySign☆218Aug 26, 2021Updated 4 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Stop Defender Service using C# via Token Impersonation☆171Jan 30, 2022Updated 4 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,647Aug 6, 2022Updated 3 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆254Mar 7, 2022Updated 4 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Nov 24, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Shellcode launcher for AV bypass☆214Dec 23, 2023Updated 2 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,252Apr 24, 2026Updated 3 weeks ago
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- Neuviks Terraform Red Team Workshop☆14Aug 10, 2025Updated 9 months ago
- ☆14Jun 22, 2022Updated 3 years ago
- ☆98Apr 15, 2022Updated 4 years ago
- A User Impersonation tool - via Token or Shellcode injection☆424May 21, 2022Updated 4 years ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- Crappy Golang code to list local listening ports and their associated processes.☆34Apr 22, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 5 years ago
- Apple BLE proximity pairing message spoofing☆19Aug 29, 2023Updated 2 years ago
- Rewrote HellsGate in C# for fun and learning☆86Feb 10, 2022Updated 4 years ago
- C# C2 Framework centered around Stage 1 operations☆213Apr 4, 2022Updated 4 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆185Jan 9, 2022Updated 4 years ago
- Microsoft Azure scripts☆14Dec 29, 2024Updated last year
- ☠️ Code for the Hackfest Workshop☆10Oct 12, 2024Updated last year
- Start new PowerShell without etw and amsi in pure nim☆157Feb 14, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,281Apr 23, 2026Updated last month
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆487Jul 9, 2024Updated last year
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆158Nov 1, 2022Updated 3 years ago
- ErebusGate for Nim Bypass AV/EDR☆160Nov 7, 2022Updated 3 years ago
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 6 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated 2 years ago