willbtlr / imperson8Links
A CLI tool for leveraging IDP signing keys to impersonate users and groups
☆19Updated 4 years ago
Alternatives and similar repositories for imperson8
Users that are interested in imperson8 are comparing it to the libraries listed below
Sorting:
- Payload designed for targeting Jamf enrolled devices.☆38Updated 2 years ago
- ☆15Updated 2 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆49Updated 4 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆94Updated 2 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆39Updated 3 years ago
- ☆9Updated 3 years ago
- Apfell Golang macOS/Linux/Windows implant☆89Updated 3 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆56Updated 5 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆166Updated 4 years ago
- JXA script for Mythic that prints the TCC.db☆15Updated 4 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆62Updated 2 years ago
- Run commands on linux through those pesky firewalls☆26Updated 9 years ago
- In motherland, target network calls you!☆60Updated 6 years ago
- Template repo for hooking 3rd party agents into Mythic while hosting them on external GitHub Repos☆47Updated 6 months ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆47Updated 4 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆73Updated 5 years ago
- Change up a binary's embedded resources with this little creature.☆34Updated 5 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆13Updated 4 years ago
- Quick and dirty dynamic redirect.rules generator☆158Updated 2 years ago
- ☆20Updated last year
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28Updated 6 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆44Updated last year
- Pypykatz agent implemented in .NET☆86Updated 6 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆13Updated 3 years ago
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆150Updated last year
- ☆110Updated 7 years ago