#impacket

8 posts

> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

impacket-GetNPUsers

AS-REP Roasting tool to extract hashes for accounts with Kerberos pre-auth disabled

#active-directory#windows#impacket
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

impacket-GetUserSPNs

Kerberoasting tool to request and extract service ticket hashes for offline cracking

#active-directory#windows#impacket
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

impacket-lookupsid

SID brute-forcing tool to enumerate domain users and groups via RPC

#active-directory#windows#impacket
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

impacket-mssqlclient

MSSQL client for interacting with Microsoft SQL servers using Windows authentication

#active-directory#windows#impacket
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

impacket-psexec

Remote command execution tool using SMB/RPC for lateral movement in Windows environments

#active-directory#windows#impacket
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

impacket-secretsdump

Extracts credentials and secrets from Windows systems including SAM, LSA, and NTDS.dit

#active-directory#windows#impacket
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

impacket-smbserver

Sets up a quick SMB server for file transfers during penetration testing

#windows#impacket#file-transfer
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
> Tools
ToolsFebruary 9, 2026

impacket-wmiexec

Remote command execution using WMI for stealthy lateral movement without writing to disk

#active-directory#windows#impacket