msImpersonate - User account impersonation written in pure Python3
☆108May 17, 2022Updated 3 years ago
Alternatives and similar repositories for msImpersonate
Users that are interested in msImpersonate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python3 o365 User Enumeration Tool☆570Jan 28, 2026Updated 3 months ago
- LDAP enumeration tool implemented in Python3☆225May 20, 2025Updated 11 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆357Oct 22, 2024Updated last year
- MayorSec DNS Enumeration Tool☆91Nov 30, 2024Updated last year
- Internal Network Penetration Test Playbook☆17Apr 18, 2022Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆20Oct 24, 2022Updated 3 years ago
- Impacket☆50Feb 25, 2026Updated 2 months ago
- Koppeling x Metatwin x LazySign☆218Aug 26, 2021Updated 4 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Stop Defender Service using C# via Token Impersonation☆170Jan 30, 2022Updated 4 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,642Aug 6, 2022Updated 3 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆253Mar 7, 2022Updated 4 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Nov 24, 2022Updated 3 years ago
- Shellcode launcher for AV bypass☆214Dec 23, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,237Apr 24, 2026Updated last week
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- Neuviks Terraform Red Team Workshop☆14Aug 10, 2025Updated 8 months ago
- ☆14Jun 22, 2022Updated 3 years ago
- ☆98Apr 15, 2022Updated 4 years ago
- A User Impersonation tool - via Token or Shellcode injection☆423May 21, 2022Updated 3 years ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- Apple BLE proximity pairing message spoofing☆19Aug 29, 2023Updated 2 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Rewrote HellsGate in C# for fun and learning☆86Feb 10, 2022Updated 4 years ago
- C# C2 Framework centered around Stage 1 operations☆212Apr 4, 2022Updated 4 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆185Jan 9, 2022Updated 4 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- Microsoft Azure scripts☆14Dec 29, 2024Updated last year
- Start new PowerShell without etw and amsi in pure nim☆157Feb 14, 2022Updated 4 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,278Apr 23, 2026Updated last week
- Bypass AMSI By Dividing files into multiple smaller files☆46Dec 12, 2022Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆486Jul 9, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆158Nov 1, 2022Updated 3 years ago
- ErebusGate for Nim Bypass AV/EDR☆160Nov 7, 2022Updated 3 years ago
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 6 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated 2 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆1,028Aug 29, 2023Updated 2 years ago