In .NET Framework, using this would let me impersonate a user in Active Directory to gain access to a locked down folder on the file server: [DllImport("advapi3
kaggle
nstextview
dynamics-crm-365
nativexml
laravel-auditing
unordered-set
label-encoding
hypotenuse
bound-variable
figma-api
moltenvk
sdl-image
go-echo
webtest
facebook-tag
jquery-1.4
elasticsearch-dsl">elasticsearch-dsl
git-merge-conflict
jquery-file-upload
confluent-rest-proxy
pressed
aws-aurora-serverless
azure-container-instances
vhdl
nstablecellview
scene7
echosign
data-annotations
awesomium
database-mirroring