CompassSecurity / bloodhoundce-resources
☆28Updated 3 weeks ago
Alternatives and similar repositories for bloodhoundce-resources:
Users that are interested in bloodhoundce-resources are comparing it to the libraries listed below
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆25Updated 3 months ago
- ☆55Updated 2 months ago
- A Python POC for CRED1 over SOCKS5☆147Updated 6 months ago
- ☆58Updated last week
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆112Updated 3 weeks ago
- ☆71Updated last year
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆38Updated 2 months ago
- ☆88Updated 2 years ago
- Adversary Emulation Framework☆98Updated 9 months ago
- Lateral Movement☆122Updated last year
- ☆50Updated 5 months ago
- ☆80Updated 8 months ago
- ☆117Updated 3 weeks ago
- ☆54Updated 2 months ago
- Efflanrs - GUI for Snaffler Output☆26Updated 7 months ago
- Living off the land searches for explorer and sharepoint☆78Updated 5 months ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆55Updated 3 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated 2 years ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆32Updated last month
- Get Fine Grained Password Policy☆70Updated last week
- ☆43Updated 2 weeks ago
- Enumerate Domain Users Without Authentication☆31Updated 3 months ago
- CLI tool to interact with the BloodHound CE API☆45Updated last month
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆73Updated 11 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆80Updated 7 months ago
- PowerShell Reverse Shell☆61Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 10 months ago
- ☆44Updated 9 months ago