Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP
☆84May 17, 2025Updated 11 months ago
Alternatives and similar repositories for NetImpostor
Users that are interested in NetImpostor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆57Jul 8, 2025Updated 9 months ago
- C2 writen in Rust & Go powered by Tor network.☆155Oct 30, 2025Updated 6 months ago
- Persist like a Dodder☆68May 19, 2025Updated 11 months ago
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 7 months ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 5 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated last year
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- ADFS Brute-Force Login Script☆10Mar 19, 2024Updated 2 years ago
- Repo hacks☆21Dec 7, 2025Updated 4 months ago
- ☆44Jul 17, 2025Updated 9 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 5 months ago
- Lateral movement with DCOM DLL hijacking☆178Jul 4, 2025Updated 10 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆37Oct 1, 2025Updated 7 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- External C2 is a specification to allow third-party programs to act as a communication layer for Cobalt Strike’s Beacon payload.☆18Jul 17, 2025Updated 9 months ago
- ☆36Apr 19, 2026Updated 2 weeks ago
- ☆18Feb 29, 2024Updated 2 years ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆103Jul 9, 2025Updated 9 months ago
- Azure Post Exploitation Framework☆246Oct 27, 2025Updated 6 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Find what egress ports are allowed☆47Nov 19, 2025Updated 5 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆136Aug 23, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Claude MCP server to perform analysis on ROADrecon data☆50Mar 30, 2025Updated last year
- A Python POC for CRED1 over SOCKS5☆166Oct 5, 2024Updated last year
- Generate and Manage KeyCredentialLinks☆256Mar 9, 2026Updated last month
- ☆55Jun 28, 2025Updated 10 months ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated 2 months ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 8 months ago
- ☆16Jan 9, 2025Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆419Apr 24, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 10 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆242Aug 25, 2024Updated last year
- Stage 0☆169Dec 18, 2024Updated last year
- Protected Process Dumper Tool☆590Aug 30, 2023Updated 2 years ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆151Feb 10, 2025Updated last year
- Roast in the Middle☆294Sep 19, 2025Updated 7 months ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated last month