Impack-only implementation of WinRM protocol with support for NTLM and Kerberos auth
☆121Oct 20, 2025Updated 4 months ago
Alternatives and similar repositories for winrmexec
Users that are interested in winrmexec are comparing it to the libraries listed below
Sorting:
- a minimalistic winrm client written in python☆25May 15, 2025Updated 9 months ago
- PowerShell Script to automatically abuse the BadSuccessor vulnerability (CVE-2025-53779)☆44Nov 19, 2025Updated 3 months ago
- A PoC for the dMSA Active Directory Domain Takeover deemed BadSuccessor☆48Jul 20, 2025Updated 7 months ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆332Jan 24, 2026Updated last month
- Rust crate to run commands as another user☆54Feb 12, 2026Updated 2 weeks ago
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- Just another Powerview alternative but on steroids☆868Feb 21, 2026Updated last week
- Tiny and fast port scanner (Sliver edition)☆27Feb 17, 2026Updated last week
- Windows Privilege Escalation☆23Jun 7, 2022Updated 3 years ago
- Timeroasting scripts by Tom Tervoort☆386Nov 11, 2025Updated 3 months ago
- Malifar is a GPU-accelerated NSEC3 DNS zone dumper☆14Jun 4, 2024Updated last year
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆386Sep 26, 2025Updated 5 months ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- Impacket with --remove-mic-partial☆28Jan 8, 2026Updated last month
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 4 months ago
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆24Jan 19, 2026Updated last month
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Grafana RCE exploit (CVE-2024-9264)☆39Oct 21, 2024Updated last year
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Sep 11, 2024Updated last year
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 6 months ago
- A portable bridge between your C2 infrastructure and Discord, built for quick and lightweight operations.☆12Jun 3, 2025Updated 8 months ago
- A simple research-focused AES-based shellcode loader demonstrating in-memory execution and NTAPI techniques to help understand how custom…☆38Feb 19, 2026Updated last week
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated last month
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆25Jul 9, 2025Updated 7 months ago
- Collection of powershell scripts I used to complete my CARTP and CARTE courses.☆49Updated this week
- ☆29Sep 4, 2024Updated last year
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Apr 13, 2025Updated 10 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆16Jul 15, 2025Updated 7 months ago
- The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful u…☆33Feb 16, 2026Updated last week
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- ☆23Dec 31, 2025Updated 2 months ago
- eval() Exploit POC for Searchor 2.4.2 and lower☆11Apr 10, 2023Updated 2 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- ☆95Jan 16, 2025Updated last year
- A portable C# utility for enumerating local and remote windows sessions☆56Jan 1, 2026Updated 2 months ago
- Kerberoast with ACL abuse capabilities☆609Dec 16, 2024Updated last year
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆259Nov 3, 2025Updated 3 months ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆146Aug 16, 2021Updated 4 years ago