8com / bloodhound-adAnalysis
Automation of Active Directory penetration testing tasks on top of BloodHound CE
☆34Updated last year
Alternatives and similar repositories for bloodhound-adAnalysis:
Users that are interested in bloodhound-adAnalysis are comparing it to the libraries listed below
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- ☆52Updated last year
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆30Updated 4 months ago
- ☆44Updated 10 months ago
- ☆27Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- ☆21Updated last year
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- ☆62Updated this week
- Scripts to interact with Microsoft Graph APIs☆36Updated 6 months ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- This script gets all accepted domains in Microsoft 365 using autodiscover, gets the tenant name and checks if there is a Microsoft Defend…☆24Updated 11 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- Scripts that automate portions of pentests.☆50Updated last week
- ☆71Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆21Updated 3 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Find Inbound Email Domains☆22Updated last year
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆27Updated 2 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆29Updated last month
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆56Updated 2 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 7 months ago
- Extract registry and NTDS secrets from local or remote disk images☆40Updated last month
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago