Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP
☆84May 17, 2025Updated 10 months ago
Alternatives and similar repositories for NetImpostor
Users that are interested in NetImpostor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆53Jul 8, 2025Updated 8 months ago
- C2 writen in Rust & Go powered by Tor network.☆153Oct 30, 2025Updated 4 months ago
- Persist like a Dodder☆68May 19, 2025Updated 10 months ago
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 6 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 11 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Repo hacks☆21Dec 7, 2025Updated 3 months ago
- ☆43Jul 17, 2025Updated 8 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Lateral movement with DCOM DLL hijacking☆176Jul 4, 2025Updated 8 months ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 4 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆37Oct 1, 2025Updated 5 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- ☆36Feb 5, 2026Updated last month
- ☆18Feb 29, 2024Updated 2 years ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆103Jul 9, 2025Updated 8 months ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 4 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Find what egress ports are allowed☆46Nov 19, 2025Updated 4 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆136Aug 23, 2025Updated 7 months ago
- Claude MCP server to perform analysis on ROADrecon data☆49Mar 30, 2025Updated 11 months ago
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- Generate and Manage KeyCredentialLinks☆253Mar 9, 2026Updated 2 weeks ago
- ☆53Jun 28, 2025Updated 8 months ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated last month
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 6 months ago
- ☆17Jan 9, 2025Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆206Mar 6, 2025Updated last year
- A bunch of shenanigans using functions, VEH and more☆38Jun 8, 2025Updated 9 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆242Aug 25, 2024Updated last year
- Stage 0☆169Dec 18, 2024Updated last year
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆342Mar 16, 2026Updated last week
- Protected Process Dumper Tool☆584Aug 30, 2023Updated 2 years ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Roast in the Middle☆294Sep 19, 2025Updated 6 months ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last month
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 7 months ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆67Dec 15, 2025Updated 3 months ago