g4uss47 / Invoke-MimikatzLinks
Powershell Mimikatz Loader
☆68Updated last year
Alternatives and similar repositories for Invoke-Mimikatz
Users that are interested in Invoke-Mimikatz are comparing it to the libraries listed below
Sorting:
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆332Updated 3 years ago
- Attempt at Obfuscated version of SharpCollection☆232Updated 3 weeks ago
- Python implementation for PetitPotam☆216Updated 4 years ago
- Precompiled executable☆61Updated 9 months ago
- 🍊 Orange Tsai EventViewer RCE☆190Updated 3 years ago
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆282Updated 4 years ago
- Powershell version of SharpGPOAbuse☆88Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆76Updated last year
- MS-FSRVP coercion abuse PoC☆301Updated 3 years ago
- ☆338Updated 3 weeks ago
- ☆234Updated last year
- Collection of remote authentication triggers in C#☆515Updated last year
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆436Updated 11 months ago
- Escalate Service Account To LocalSystem via Kerberos☆400Updated 2 years ago
- Use ESC1 to perform a makeshift DCSync and dump hashes☆209Updated 2 years ago
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆155Updated 3 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆298Updated 2 years ago
- A collection of code snippets built to assist with breaking chains.☆125Updated last year
- AD ACL abuse☆360Updated 2 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆340Updated last year
- Fileless atexec, no more need for port 445☆401Updated last year
- Shellcode launcher for AV bypass☆217Updated last year
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆246Updated last week
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆490Updated 6 months ago
- Proof-of-concept tools for my AD Forest trust research☆230Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆451Updated last week
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆511Updated last week
- micr0shell is a Python script that dynamically generates Windows X64 PIC Null-Free reverse shell shellcode.☆204Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆86Updated 3 years ago
- Cobalt Strike BOF for evasive .NET assembly execution☆284Updated 8 months ago