willbtlr / imperson8
A CLI tool for leveraging IDP signing keys to impersonate users and groups
☆19Updated 3 years ago
Alternatives and similar repositories for imperson8:
Users that are interested in imperson8 are comparing it to the libraries listed below
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆38Updated 2 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- Payload designed for targeting Jamf enrolled devices.☆37Updated last year
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 4 years ago
- In motherland, target network calls you!☆59Updated 6 years ago
- Apfell Golang macOS/Linux/Windows implant☆89Updated 3 years ago
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆101Updated 3 years ago
- ☆106Updated 6 months ago
- ☆15Updated 2 years ago
- ☆9Updated 3 years ago
- JXA script for Mythic that prints the TCC.db☆15Updated 3 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆71Updated 5 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆167Updated 4 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆43Updated last year
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆146Updated last year
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆13Updated 3 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆46Updated 3 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Updated 5 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆106Updated 5 years ago
- ☆19Updated last year
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28Updated 5 years ago
- ☆97Updated 4 years ago
- Library of traffic redirectors☆26Updated 4 years ago
- ☆108Updated 3 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆55Updated 5 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Updated 2 years ago
- A HTA shell to assist with breakout assessments.☆112Updated 3 years ago
- Template repo for hooking 3rd party agents into Mythic while hosting them on external GitHub Repos☆45Updated 4 months ago
- Managed code hooking template.☆108Updated 4 years ago