willbtlr / imperson8Links
A CLI tool for leveraging IDP signing keys to impersonate users and groups
☆19Updated 4 years ago
Alternatives and similar repositories for imperson8
Users that are interested in imperson8 are comparing it to the libraries listed below
Sorting:
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆153Updated 2 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆170Updated 5 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆227Updated 6 years ago
- ☆121Updated last month
- A repo full of example gscripts☆102Updated 6 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago
- Quick and dirty dynamic redirect.rules generator☆169Updated 3 years ago
- ☄️ go-out - A Golang egress buster.☆126Updated last week
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 6 years ago
- Apfell Golang macOS/Linux/Windows implant☆90Updated 4 years ago
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆105Updated 3 years ago
- easy-to-use payload hosting☆275Updated 3 years ago
- A Django application to help red team operators manage a library of domain names☆167Updated 2 years ago
- Provides an easy way to collect and send Slack access & integration logs.☆13Updated 4 years ago
- Payload designed for targeting Jamf enrolled devices.☆39Updated 2 years ago
- ☆108Updated 4 years ago
- Proper Payload Protection Prevents Poor Performance☆76Updated 3 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Updated 6 months ago
- Elite is the client-side component of the Covenant project. Covenant is a .NET command and control framework that aims to highlight the a…☆123Updated 2 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆113Updated last year
- ☆10Updated 4 years ago
- Managed code hooking template.☆108Updated 4 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Updated 4 years ago
- A HTA shell to assist with breakout assessments.☆113Updated 4 years ago
- A curated list of awesome BloodhoundAD resources☆238Updated 3 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Updated 3 years ago
- Silencing Sysmon via driver unload☆235Updated 3 years ago
- Resources for our Active Directory security workshops☆141Updated 4 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆149Updated 5 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Updated 5 years ago