Modified version of Impacket to use dynamic NTLMv2 Challenge/Response
☆20Dec 26, 2022Updated 3 years ago
Alternatives and similar repositories for Impacket
Users that are interested in Impacket are comparing it to the libraries listed below
Sorting:
- Modified version of Pypykatz to print encrypted credentials☆56Dec 26, 2022Updated 3 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- Recovering NTLM hashes from Credential Guard☆378Dec 26, 2022Updated 3 years ago
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 3 months ago
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆50May 5, 2025Updated 9 months ago
- Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)☆57Jun 15, 2025Updated 8 months ago
- ☆13Feb 25, 2023Updated 3 years ago
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆155Aug 3, 2022Updated 3 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 10 months ago
- A simple script to elevate current session to SYSTEM (needs to be run as Administrator)☆16Nov 11, 2024Updated last year
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 6 months ago
- A tool to show only printable characters of a file☆11Oct 2, 2023Updated 2 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- mitigation script by disabling ipv6 of all interfaces☆14Aug 15, 2024Updated last year
- ☆54Oct 13, 2025Updated 4 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated 3 weeks ago
- Listing UDP connections with remote address without sniffing.☆31Sep 26, 2023Updated 2 years ago
- ☆58Jun 2, 2025Updated 8 months ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- ☆47Dec 5, 2025Updated 2 months ago
- ☆32Feb 13, 2026Updated 2 weeks ago
- Using PowerShell to quickly scan through the SYSVOL share for exposed credentials within auto logon policies.☆14Nov 30, 2022Updated 3 years ago
- A repo of scripts I find helpful for daily tasks.☆30Dec 8, 2025Updated 2 months ago
- 内存分析中玩贪吃蛇☆16Jan 13, 2024Updated 2 years ago
- Enumerate Callbacks and all Object Types☆16Jan 9, 2023Updated 3 years ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆11Jul 15, 2022Updated 3 years ago
- A Patchless AMSI Bypass Technique using VEH²☆30Jun 22, 2025Updated 8 months ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike☆185Oct 29, 2025Updated 4 months ago
- ☆41Dec 24, 2025Updated 2 months ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- ☆35Dec 6, 2023Updated 2 years ago
- ☆39Sep 25, 2023Updated 2 years ago
- ☆60Dec 15, 2023Updated 2 years ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year