Modified version of Impacket to use dynamic NTLMv2 Challenge/Response
☆20Dec 26, 2022Updated 3 years ago
Alternatives and similar repositories for Impacket
Users that are interested in Impacket are comparing it to the libraries listed below
Sorting:
- Modified version of Pypykatz to print encrypted credentials☆56Dec 26, 2022Updated 3 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- Recovering NTLM hashes from Credential Guard☆377Dec 26, 2022Updated 3 years ago
- A tool to show only printable characters of a file☆11Oct 2, 2023Updated 2 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- ☆48Dec 5, 2025Updated 3 months ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆51May 5, 2025Updated 10 months ago
- ☆60Jun 2, 2025Updated 9 months ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆11Jul 15, 2022Updated 3 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- 内存分析中玩贪吃蛇☆16Jan 13, 2024Updated 2 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- Enumerate Callbacks and all Object Types☆16Jan 9, 2023Updated 3 years ago
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆156Aug 3, 2022Updated 3 years ago
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 4 months ago
- Basic interactive Windows kernel offensive toolkit written in C☆137Sep 20, 2025Updated 6 months ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 11 months ago
- mitigation script by disabling ipv6 of all interfaces☆14Aug 15, 2024Updated last year
- Listing UDP connections with remote address without sniffing.☆31Sep 26, 2023Updated 2 years ago
- ☆60Dec 15, 2023Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆27Oct 1, 2023Updated 2 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- k8s ConfigMaps and Secrets Usage.☆11Jan 24, 2025Updated last year
- ☆39Sep 25, 2023Updated 2 years ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year
- A simple script to elevate current session to SYSTEM (needs to be run as Administrator)☆16Nov 11, 2024Updated last year
- A Patchless AMSI Bypass Technique using VEH²☆31Jun 22, 2025Updated 8 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- Simple .NET loader for loading and executing Powershell payloads☆17Nov 5, 2021Updated 4 years ago
- A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike☆193Oct 29, 2025Updated 4 months ago
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆327Jan 31, 2023Updated 3 years ago
- ☆35Dec 6, 2023Updated 2 years ago
- defender_database☆24Oct 31, 2023Updated 2 years ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year