willbtlr / imperson8Links
A CLI tool for leveraging IDP signing keys to impersonate users and groups
☆19Updated 4 years ago
Alternatives and similar repositories for imperson8
Users that are interested in imperson8 are comparing it to the libraries listed below
Sorting:
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆152Updated 2 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆167Updated 5 years ago
- A repo full of example gscripts☆100Updated 6 years ago
- ☆116Updated 6 months ago
- Quick and dirty dynamic redirect.rules generator☆165Updated 3 years ago
- Apfell Golang macOS/Linux/Windows implant☆89Updated 4 years ago
- Proper Payload Protection Prevents Poor Performance☆74Updated 3 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago
- Managed code hooking template.☆108Updated 4 years ago
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆106Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆51Updated 5 years ago
- Payload designed for targeting Jamf enrolled devices.☆38Updated 2 years ago
- ☄️ go-out - A Golang egress buster.☆129Updated last year
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆228Updated 6 years ago
- ☆10Updated 4 years ago
- easy-to-use payload hosting☆272Updated 3 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆13Updated 4 years ago
- 👊 A small utility to play with IBM MQ☆68Updated 2 years ago
- ☆41Updated 5 years ago
- A HTA shell to assist with breakout assessments.☆112Updated 3 years ago
- A Django application to help red team operators manage a library of domain names☆166Updated 2 years ago
- ☆108Updated 3 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆13Updated 3 years ago
- Targeted Payload Execution☆100Updated 5 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Updated 4 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Updated 5 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆148Updated 5 years ago
- In motherland, target network calls you!☆60Updated 7 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆39Updated 3 years ago