☆102Feb 24, 2026Updated last week
Alternatives and similar repositories for bloodhoundce-resources
Users that are interested in bloodhoundce-resources are comparing it to the libraries listed below
Sorting:
- A community-driven collection of BloodHound queries☆171Feb 17, 2026Updated 2 weeks ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆292Feb 10, 2026Updated 3 weeks ago
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆460Jan 15, 2026Updated last month
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆134Aug 23, 2025Updated 6 months ago
- The DCERPC only printerbug.py version☆206Oct 30, 2025Updated 4 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆275Dec 27, 2024Updated last year
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆358Jan 8, 2026Updated last month
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆656Jan 16, 2026Updated last month
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆72Oct 22, 2025Updated 4 months ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- BloodHound Automation: Collection, Analysis and Data Import☆19Nov 12, 2025Updated 3 months ago
- Check for LDAP protections regarding the relay of NTLM authentication☆530Nov 19, 2024Updated last year
- Hybrid AD utilities for ROADtools☆108May 25, 2025Updated 9 months ago
- A BloodHound collector for Microsoft Configuration Manager☆392Jul 7, 2025Updated 8 months ago
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- ☆757Feb 3, 2026Updated last month
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆549Nov 23, 2025Updated 3 months ago
- adws enumeration bof☆169Feb 16, 2026Updated 2 weeks ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 8 months ago
- ☆15Jan 26, 2023Updated 3 years ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆672Oct 23, 2025Updated 4 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆401Jan 14, 2026Updated last month
- AD ACL abuse☆389Sep 11, 2025Updated 5 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆637May 8, 2025Updated 9 months ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆261Nov 22, 2025Updated 3 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆364Jan 29, 2026Updated last month
- Pwdlyser is an all encompassing security auditing tool. This repo serves as the open-source base for the new version of Pwdlyser (previou…☆25Sep 3, 2024Updated last year
- Advanced Windows authentication token extraction and decryption tool for red team operations and security research☆84Dec 30, 2025Updated 2 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆892Updated this week
- ☆185Dec 4, 2024Updated last year
- ☆772May 7, 2025Updated 10 months ago
- Rainbow table generation & lookup tools.☆31Dec 17, 2025Updated 2 months ago
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 6 months ago
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆270Feb 5, 2026Updated last month
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 2 months ago
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 7 months ago
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,475Jan 23, 2026Updated last month