impersonation
Here are 42 public repositories matching this topic...
-
Updated
Jul 7, 2017 - Python
Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks
-
Updated
May 6, 2018 - Python
-
Updated
Jun 14, 2018 - Java
The Fast, Secure and Scalable Admin Panel / Dashboard for Meteor.js
-
Updated
Jan 22, 2019 - JavaScript
Impersonate login Admin as User
-
Updated
Apr 3, 2019 - PHP
xUnit extensions providing Windows Authentication using impersonation for integration testing
-
Updated
Aug 4, 2019 - C#
🕵🏿 Extends the Wordpress "User Switching" plugin by making the "Switch to User" functionality available for WooCommerce Orders in the WordPress admin.
-
Updated
Sep 3, 2020 - PHP
Kubernetes SSH Authentication gateway.
-
Updated
Oct 31, 2020 - Go
Debugging a problem and need to login as one of your customers? This allows you to authenticate as any of your customers.
-
Updated
Dec 2, 2020 - PHP
Impersonate Windows built-in SYSTEM account
-
Updated
Apr 7, 2021 - PowerShell
Laravel JWT Impersonate is a plugin that allows you to authenticate as your users with JWT authentication in a REST API app.
-
Updated
May 19, 2021 - PHP
-
Updated
Dec 20, 2021 - Python
-
Updated
Jan 7, 2022 - PHP
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
-
Updated
Mar 27, 2022 - Pascal
ASP.NET Core + Angular JWT authentication; integration tests; login, logout, refresh token, impersonation, authentication, authorization
-
Updated
Apr 16, 2022 - JavaScript
How to access AdminAPI.DirectoryService using Service Account, .Net Framework 4.8 (C#)
-
Updated
Apr 27, 2022 - C#
msImpersonate - User account impersonation written in pure Python3
-
Updated
May 17, 2022 - Python
The main repository for our DE project! This website will be hosted using GitHub pages. Our plan is to make a website which anyone can visit in case or for prevention of cyber attacks.
-
Updated
May 18, 2022
Improve this page
Add a description, image, and links to the impersonation topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the impersonation topic, visit your repo's landing page and select "manage topics."