Deception implementation through analysis of BloodHound data
☆53Oct 9, 2025Updated 4 months ago
Alternatives and similar repositories for F4keH0und
Users that are interested in F4keH0und are comparing it to the libraries listed below
Sorting:
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- ☆43Jul 17, 2025Updated 7 months ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆27Dec 13, 2021Updated 4 years ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆102Jul 9, 2025Updated 7 months ago
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 5 months ago
- Hybrid AD utilities for ROADtools☆108May 25, 2025Updated 9 months ago
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆47Oct 4, 2025Updated 5 months ago
- Mixnet Messaging App☆11Oct 3, 2025Updated 5 months ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- Interact with Windows RPC Services over SMB using go-smb☆11Updated this week
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 7 months ago
- I want to say please and thank you to Claude, but I don't want to waste tokens on it.☆26Feb 18, 2026Updated 2 weeks ago
- Sample project to demonstrate how to integrate several existing balena projects in one☆10Dec 27, 2019Updated 6 years ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆27Jul 11, 2025Updated 7 months ago
- Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)☆11Jan 22, 2025Updated last year
- ☆18Jan 26, 2026Updated last month
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- Minimalistic port-spoofer written in Python☆11Jan 9, 2025Updated last year
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆17Jan 22, 2026Updated last month
- ☆20Sep 6, 2025Updated 5 months ago
- this is a tcl script for unpacking bitrock packed archives☆16Sep 27, 2020Updated 5 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- psPAS Example scripts & code☆11Jul 19, 2020Updated 5 years ago
- ☆11Oct 3, 2021Updated 4 years ago
- Wintermute Endpoint Search: Parse source code pulling out endpoints, parameters, and a bunch of other stuff☆14May 20, 2019Updated 6 years ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 6 months ago
- A compact and comprehensive Raspberry Pi Pico W based Learning Kit having onboard actuators, sensors, and LEDs makes learning enjoyable. …☆12Apr 9, 2025Updated 10 months ago
- ☆12May 21, 2025Updated 9 months ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated last month
- ☆14Apr 27, 2019Updated 6 years ago
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Apr 13, 2019Updated 6 years ago
- ☆12Jun 24, 2022Updated 3 years ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated last year