Impack-only implementation of WinRM protocol with support for NTLM and Kerberos auth
☆128Oct 20, 2025Updated 5 months ago
Alternatives and similar repositories for winrmexec
Users that are interested in winrmexec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a minimalistic winrm client written in python☆26Mar 6, 2026Updated last month
- PowerShell Script to automatically abuse the BadSuccessor vulnerability (CVE-2025-53779)☆45Nov 19, 2025Updated 4 months ago
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- Execute commands interactively on remote Windows machines using the WinRM protocol (just faster)☆344Mar 21, 2026Updated 3 weeks ago
- A PoC for the dMSA Active Directory Domain Takeover deemed BadSuccessor☆54Mar 6, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Grafana RCE exploit (CVE-2024-9264)☆39Oct 21, 2024Updated last year
- Timeroasting scripts by Tom Tervoort☆394Nov 11, 2025Updated 5 months ago
- Tiny and fast port scanner (Sliver edition)☆28Feb 17, 2026Updated last month
- Powerview on steroids☆911Mar 10, 2026Updated last month
- Rust crate to run commands as another user☆54Feb 12, 2026Updated last month
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆18Jul 15, 2025Updated 8 months ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- A portable bridge between your C2 infrastructure and Discord, built for quick and lightweight operations.☆12Jun 3, 2025Updated 10 months ago
- Kerberoast with ACL abuse capabilities☆629Dec 16, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface. Implementation of ligolo-ng into sliver☆29Feb 27, 2025Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆59Jul 23, 2025Updated 8 months ago
- Dump LSASS via physical memory read primitives in vulnerable kernel drivers☆302Feb 2, 2026Updated 2 months ago
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 6 months ago
- PoC Exploit for the NTLM reflection SMB flaw.☆691Feb 18, 2026Updated last month
- ☆29Sep 4, 2024Updated last year
- Windows Privilege Escalation☆23Jun 7, 2022Updated 3 years ago
- Windows remote execution multitool☆786Mar 25, 2026Updated 2 weeks ago
- Impacket with --remove-mic-partial☆36Jan 8, 2026Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆396Sep 26, 2025Updated 6 months ago
- Multiplayer pivoting solution☆496Mar 7, 2026Updated last month
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 3 months ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Mar 30, 2026Updated last week
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆31Mar 27, 2025Updated last year
- The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful u…☆36Feb 16, 2026Updated last month
- A small utility to translate NTDS.dit files to SQLite format.☆84Oct 11, 2023Updated 2 years ago
- ASPX Web Shell with COFF Loader☆126Mar 10, 2026Updated last month
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,150Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Buggy script to play with GPOs☆122Dec 27, 2024Updated last year
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆258Nov 3, 2025Updated 5 months ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆369Feb 12, 2024Updated 2 years ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆61Apr 13, 2025Updated 11 months ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆73Sep 11, 2024Updated last year