msImpersonate - User account impersonation written in pure Python3
☆108May 17, 2022Updated 3 years ago
Alternatives and similar repositories for msImpersonate
Users that are interested in msImpersonate are comparing it to the libraries listed below
Sorting:
- LDAP enumeration tool implemented in Python3☆224May 20, 2025Updated 9 months ago
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆348Oct 22, 2024Updated last year
- Python3 o365 User Enumeration Tool☆567Jan 28, 2026Updated last month
- MayorSec DNS Enumeration Tool☆90Nov 30, 2024Updated last year
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 5 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,633Aug 6, 2022Updated 3 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- ☆31Sep 23, 2022Updated 3 years ago
- Shellcode launcher for AV bypass☆214Dec 23, 2023Updated 2 years ago
- A User Impersonation tool - via Token or Shellcode injection☆422May 21, 2022Updated 3 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Dec 12, 2022Updated 3 years ago
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- ShellcodeFluctuation PoC ported to Nim☆79Oct 14, 2022Updated 3 years ago
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆252Mar 7, 2022Updated 4 years ago
- ErebusGate for Nim Bypass AV/EDR☆161Nov 7, 2022Updated 3 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,199Jan 5, 2026Updated 2 months ago
- ☆82Apr 28, 2025Updated 10 months ago
- A module for CME that spiders across a domain.☆35Jul 15, 2022Updated 3 years ago
- Impacket☆49Feb 25, 2026Updated last week
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆85Feb 26, 2023Updated 3 years ago
- Koppeling x Metatwin x LazySign☆216Aug 26, 2021Updated 4 years ago
- Stop Defender Service using C# via Token Impersonation☆169Jan 30, 2022Updated 4 years ago
- ☆848Jan 12, 2026Updated last month
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆484Jul 9, 2024Updated last year
- A PowerShell armoury for security guys and girls☆467Jan 23, 2024Updated 2 years ago
- 👻👁🔍📡 If an attacker has created a fake enterprise wireless network, my goal is to deceive him.☆18Feb 10, 2019Updated 7 years ago
- Rewrote HellsGate in C# for fun and learning☆86Feb 10, 2022Updated 4 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆185Jan 9, 2022Updated 4 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- Get file less command execution for lateral movement.☆636Jun 3, 2022Updated 3 years ago
- Start new PowerShell without etw and amsi in pure nim☆157Feb 14, 2022Updated 4 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,266Dec 9, 2025Updated 3 months ago
- 🕵🏻📡👁🔍Analyzes all Open Wireless Networks for detect fake access points (Fingerprint)☆16Aug 13, 2018Updated 7 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆234Jan 28, 2022Updated 4 years ago
- ☆183Jul 2, 2022Updated 3 years ago
- RDP Checker☆64Feb 23, 2024Updated 2 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆345Jan 22, 2025Updated last year