Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP
☆84May 17, 2025Updated 10 months ago
Alternatives and similar repositories for NetImpostor
Users that are interested in NetImpostor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆56Jul 8, 2025Updated 9 months ago
- C2 writen in Rust & Go powered by Tor network.☆155Oct 30, 2025Updated 5 months ago
- Persist like a Dodder☆68May 19, 2025Updated 10 months ago
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 7 months ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated last year
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Repo hacks☆21Dec 7, 2025Updated 4 months ago
- External C2 is a specification to allow third-party programs to act as a communication layer for Cobalt Strike’s Beacon payload.☆16Jul 17, 2025Updated 8 months ago
- ☆44Jul 17, 2025Updated 8 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Lateral movement with DCOM DLL hijacking☆175Jul 4, 2025Updated 9 months ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 4 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆37Oct 1, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆93Jan 8, 2025Updated last year
- ☆36Feb 5, 2026Updated 2 months ago
- ☆18Feb 29, 2024Updated 2 years ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆103Jul 9, 2025Updated 9 months ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 5 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Find what egress ports are allowed☆46Nov 19, 2025Updated 4 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆136Aug 23, 2025Updated 7 months ago
- Claude MCP server to perform analysis on ROADrecon data☆50Mar 30, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Python POC for CRED1 over SOCKS5☆166Oct 5, 2024Updated last year
- Generate and Manage KeyCredentialLinks☆254Mar 9, 2026Updated last month
- ☆53Jun 28, 2025Updated 9 months ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated last month
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 7 months ago
- ☆17Jan 9, 2025Updated last year
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆402Mar 27, 2026Updated 2 weeks ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆240Aug 25, 2024Updated last year
- Active Directory Certificate Services (ADCS) enumeration library with BloodHound CE v6 export support☆68Mar 26, 2026Updated 2 weeks ago
- Stage 0☆168Dec 18, 2024Updated last year
- Protected Process Dumper Tool☆588Aug 30, 2023Updated 2 years ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Roast in the Middle☆294Sep 19, 2025Updated 6 months ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated 2 weeks ago