A Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for quick AD enumeration.
☆184Mar 2, 2026Updated last month
Alternatives and similar repositories for BloodBash
Users that are interested in BloodBash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- modified mssqlclient from impacket to extract policies from the SCCM database☆47Feb 24, 2026Updated last month
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆104Jan 9, 2026Updated 3 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 3 months ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 2 months ago
- ☆78Jan 1, 2026Updated 3 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 3 months ago
- PowerShell Script to automatically abuse the BadSuccessor vulnerability (CVE-2025-53779)☆45Nov 19, 2025Updated 4 months ago
- ☆28Mar 14, 2026Updated 3 weeks ago
- Impacket☆50Feb 25, 2026Updated last month
- Active Directory Vulnerability Scanner☆376Mar 3, 2026Updated last month
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆129Feb 17, 2026Updated last month
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆166Oct 21, 2025Updated 5 months ago
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago
- Web File Manager☆11Aug 21, 2025Updated 7 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆33Jan 22, 2026Updated 2 months ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆304Sep 7, 2023Updated 2 years ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 4 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆130Dec 2, 2023Updated 2 years ago
- Active Directory information dumper via ADWS for evasion purposes.☆213Feb 23, 2026Updated last month
- ☆47Dec 28, 2025Updated 3 months ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 7 months ago
- Windows Access token manipulation tool made in C#☆25Aug 24, 2025Updated 7 months ago
- LinkedIn recon the easy way☆110Jul 3, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A stager and implant that executes remote Web Assembly☆64Feb 4, 2026Updated 2 months ago
- SCEP request tool for AD CS and Intune☆75Oct 24, 2025Updated 5 months ago
- A dotnet executable to get an Entra token in an authenticated runtime☆17Oct 30, 2024Updated last year
- The Azure Execution Tool☆153Feb 6, 2026Updated 2 months ago
- kerberos in rust for fun and profit☆69Mar 13, 2026Updated 3 weeks ago
- Aliasr is a modern, feature-rich TUI launcher for penetration testing commands inspired by Arsenal, but with significantly improved funct…☆106Mar 15, 2026Updated 3 weeks ago
- Let's make quick work of GraphQL instances ;)☆25Mar 8, 2026Updated last month
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 6 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆161Jan 3, 2026Updated 3 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Creation of multiple Malware tools consisting of evasion, enumeration and exploitation☆99Updated this week
- The samples referenced in my book, Evasive Malware (No starch Press)☆53Feb 20, 2026Updated last month
- self-hosted Azure OSINT tool☆34Jun 24, 2025Updated 9 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 7 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆37Nov 12, 2025Updated 4 months ago
- adws enumeration bof☆170Feb 16, 2026Updated last month
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆69Mar 17, 2025Updated last year