msImpersonate - User account impersonation written in pure Python3
☆108May 17, 2022Updated 3 years ago
Alternatives and similar repositories for msImpersonate
Users that are interested in msImpersonate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python3 o365 User Enumeration Tool☆567Jan 28, 2026Updated 2 months ago
- LDAP enumeration tool implemented in Python3☆224May 20, 2025Updated 10 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆352Oct 22, 2024Updated last year
- MayorSec DNS Enumeration Tool☆91Nov 30, 2024Updated last year
- Internal Network Penetration Test Playbook☆17Apr 18, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆20Oct 24, 2022Updated 3 years ago
- Impacket☆50Feb 25, 2026Updated last month
- Koppeling x Metatwin x LazySign☆217Aug 26, 2021Updated 4 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Stop Defender Service using C# via Token Impersonation☆169Jan 30, 2022Updated 4 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,637Aug 6, 2022Updated 3 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆254Mar 7, 2022Updated 4 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Nov 24, 2022Updated 3 years ago
- Shellcode launcher for AV bypass☆214Dec 23, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,220Jan 5, 2026Updated 3 months ago
- Modules for my C2 course students to use for their own projects.☆72Jun 13, 2023Updated 2 years ago
- Neuviks Terraform Red Team Workshop☆14Aug 10, 2025Updated 8 months ago
- ☆14Jun 22, 2022Updated 3 years ago
- ☆98Apr 15, 2022Updated 3 years ago
- A User Impersonation tool - via Token or Shellcode injection☆423May 21, 2022Updated 3 years ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Apple BLE proximity pairing message spoofing☆19Aug 29, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Rewrote HellsGate in C# for fun and learning☆86Feb 10, 2022Updated 4 years ago
- C# C2 Framework centered around Stage 1 operations☆211Apr 4, 2022Updated 4 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆185Jan 9, 2022Updated 4 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- Microsoft Azure scripts☆14Dec 29, 2024Updated last year
- Start new PowerShell without etw and amsi in pure nim☆157Feb 14, 2022Updated 4 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,275Dec 9, 2025Updated 4 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Dec 12, 2022Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆485Jul 9, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆158Nov 1, 2022Updated 3 years ago
- ErebusGate for Nim Bypass AV/EDR☆160Nov 7, 2022Updated 3 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated 2 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆1,026Aug 29, 2023Updated 2 years ago
- ☆898Mar 25, 2026Updated 2 weeks ago