dievus / msImpersonateLinks
msImpersonate - User account impersonation written in pure Python3
☆108Updated 3 years ago
Alternatives and similar repositories for msImpersonate
Users that are interested in msImpersonate are comparing it to the libraries listed below
Sorting:
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆203Updated 2 months ago
- Browser extension that extracts users from LinkedIn company pages☆160Updated 2 years ago
- ☆100Updated 3 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257Updated 3 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- a map for the azure oriented pentests☆66Updated 2 years ago
- Password list generator for password spraying - prebaked with goodies☆104Updated 2 years ago
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆167Updated 3 weeks ago
- Modular Enumeration and Password Spraying Framework☆122Updated last year
- Simple & Customizable DNS Data Exfiltrator☆110Updated 2 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- ☆190Updated 2 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated last year
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆335Updated 9 months ago
- ☆30Updated 2 years ago
- ☆37Updated 4 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆258Updated 3 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆89Updated 3 years ago
- ☆119Updated 2 years ago
- Roast in the Middle☆292Updated 8 months ago
- Easy red team phishing with Puppeteer☆131Updated 2 years ago
- Hiding GoPhish from the boys in blue☆192Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆209Updated 2 years ago
- ☆105Updated last year
- ☆114Updated 4 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago