g4uss47 / Invoke-Mimikatz
Powershell Mimikatz Loader
☆64Updated last year
Alternatives and similar repositories for Invoke-Mimikatz
Users that are interested in Invoke-Mimikatz are comparing it to the libraries listed below
Sorting:
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆319Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆83Updated 3 years ago
- Useful Cobalt Strike BOFs found or used during engagements☆139Updated last year
- Attempt at Obfuscated version of SharpCollection☆206Updated 3 weeks ago
- DCSync Attack from Outside using Impacket☆113Updated 3 years ago
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆135Updated 2 years ago
- ☆224Updated last year
- Precompiled executable☆53Updated 2 months ago
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆275Updated 3 years ago
- Beacon Object File PoC implementation of KillDefender☆227Updated 3 years ago
- 🍊 Orange Tsai EventViewer RCE☆184Updated 3 years ago
- MS-FSRVP coercion abuse PoC☆288Updated 3 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆129Updated last year
- Python implementation for PetitPotam☆199Updated 3 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆200Updated 3 years ago
- A BOF to automate common persistence tasks for red teamers☆276Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆301Updated last year
- PoC to coerce authentication from Windows hosts using MS-WSP☆236Updated last year
- Repository contains psexec, which will help to exploit the forgotten pipe☆169Updated 6 months ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆181Updated 3 years ago
- ADCS cert template modification and ACL enumeration☆136Updated last year
- ☆86Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆71Updated 8 months ago
- ☆159Updated 6 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆137Updated last year
- A collection of code snippets built to assist with breaking chains.☆117Updated last year
- MSSQL Database Attacker tool☆189Updated 2 years ago
- Havoc C2 profile generator☆78Updated 6 months ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆154Updated last year
- Powershell version of SharpGPOAbuse☆75Updated 3 years ago