CompassSecurity / bloodhoundce-resourcesLinks
☆80Updated 3 weeks ago
Alternatives and similar repositories for bloodhoundce-resources
Users that are interested in bloodhoundce-resources are comparing it to the libraries listed below
Sorting:
- ☆227Updated last year
- Tool for Active Directory Certificate Services enumeration and abuse☆164Updated 6 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆252Updated 8 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆255Updated 2 weeks ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆147Updated last week
- Weaponizing DCOM for NTLM Authentication Coercions☆268Updated 3 months ago
- ☆201Updated 5 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆207Updated 4 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆207Updated last year
- ☆214Updated last year
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆340Updated last month
- OAuth Device Code Phishing Toolkit☆91Updated last month
- Interract with Microsoft SQL Server (MS SQL | MSSQL) servers and their linked instances in restricted environments, without the need for …☆46Updated this week
- Enumerate Domain Users Without Authentication☆269Updated 6 months ago
- Parses Snaffler output file and generate beautified outputs.☆108Updated 9 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆318Updated this week
- ☆92Updated 9 months ago
- A Python POC for CRED1 over SOCKS5☆158Updated last year
- ☆213Updated 4 months ago
- ☆148Updated 5 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆138Updated 3 months ago
- C++ Reflective Assembly Loader☆28Updated 7 months ago
- Generate and Manage KeyCredentialLinks☆174Updated 3 weeks ago
- Azure Post Exploitation Framework☆240Updated last month
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆112Updated 3 months ago
- a minimalistic winrm client written in python☆24Updated 5 months ago
- ☆183Updated 4 months ago
- Local SYSTEM auth trigger for relaying☆163Updated 3 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆166Updated 3 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆31Updated 3 weeks ago