Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP
☆84May 17, 2025Updated 9 months ago
Alternatives and similar repositories for NetImpostor
Users that are interested in NetImpostor are comparing it to the libraries listed below
Sorting:
- ☆52Jul 8, 2025Updated 7 months ago
- C2 writen in Rust & Go powered by Tor network.☆152Oct 30, 2025Updated 4 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 5 months ago
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 11 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Persist like a Dodder☆68May 19, 2025Updated 9 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Repo hacks☆21Dec 7, 2025Updated 2 months ago
- ☆43Jul 17, 2025Updated 7 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆102Jul 9, 2025Updated 7 months ago
- Generate and Manage KeyCredentialLinks☆248Jan 30, 2026Updated last month
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 3 months ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 5 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- ☆51Jun 28, 2025Updated 8 months ago
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 8 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆236Aug 25, 2024Updated last year
- ☆35Feb 5, 2026Updated 3 weeks ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆317Feb 8, 2026Updated 3 weeks ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated 2 weeks ago
- ☆17Jan 9, 2025Updated last year
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last week
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆95Feb 3, 2026Updated last month
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆131Aug 23, 2025Updated 6 months ago
- Lateral movement with DCOM DLL hijacking☆177Jul 4, 2025Updated 8 months ago
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- ☆100Sep 1, 2024Updated last year
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- Cobalt Strike BOF☆43Dec 10, 2025Updated 2 months ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆70Aug 4, 2025Updated 6 months ago
- A PoC for Early Cascade process injection technique.☆211Jan 30, 2025Updated last year
- The best powershell obfuscator ever made☆124Aug 1, 2025Updated 7 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interact…☆52Oct 16, 2025Updated 4 months ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- ☆18Feb 29, 2024Updated 2 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago