Impacket is a collection of Python classes for working with network protocols.
☆31Jun 27, 2024Updated last year
Alternatives and similar repositories for impacket
Users that are interested in impacket are comparing it to the libraries listed below
Sorting:
- Impacket is a collection of Python classes for working with network protocols.☆20Nov 13, 2025Updated 3 months ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆13Jul 16, 2025Updated 7 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 6 months ago
- A tool to assist DLL hijacking via the Havoc GUI☆12Jan 9, 2024Updated 2 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- a port of privkit bof for havoc☆23Dec 8, 2023Updated 2 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆46Feb 27, 2024Updated 2 years ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- SyscallLoader☆11Sep 13, 2021Updated 4 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- ☆11Dec 8, 2023Updated 2 years ago
- ☆12Aug 16, 2024Updated last year
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- PAN-OS auth bypass + RCE☆47Nov 19, 2024Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- Async Python library to parse local and remote disk images.☆82Jul 11, 2025Updated 7 months ago
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆155Aug 3, 2022Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Oct 5, 2022Updated 3 years ago
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆72Updated this week
- ☆159Feb 8, 2025Updated last year
- More EFS coerced authentication method with PetitPotam.py☆27Mar 21, 2023Updated 2 years ago
- ☆167Feb 18, 2026Updated last week
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆361Dec 13, 2025Updated 2 months ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Apr 13, 2025Updated 10 months ago
- Direct syscalls Injection to bypass AV/EDR☆12May 18, 2024Updated last year
- Havoc plugin allowing in-memory execution of PowerShell cmdlets☆13Dec 14, 2023Updated 2 years ago
- Detect AES and RSA keys in a memory dump.☆14Jul 28, 2016Updated 9 years ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- Custom Python shellcode encryptor and obfuscator☆14Jul 31, 2025Updated 7 months ago
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆137Aug 10, 2024Updated last year
- Find Inbound Email Domains☆35Dec 21, 2023Updated 2 years ago