PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph
☆24Aug 2, 2025Updated 6 months ago
Alternatives and similar repositories for SCCM_SQL_Collector
Users that are interested in SCCM_SQL_Collector are comparing it to the libraries listed below
Sorting:
- ☆51Jun 28, 2025Updated 8 months ago
- A dotnet executable to get an Entra token in an authenticated runtime☆16Oct 30, 2024Updated last year
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆39Aug 29, 2023Updated 2 years ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- TokenCert☆102Nov 15, 2024Updated last year
- An Ansible collection that installs an SCCM deployment with optional configurations.☆101Dec 8, 2025Updated 2 months ago
- Python script to leverage MSFT_MTProcess WMI class☆39Sep 17, 2025Updated 5 months ago
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆38Dec 7, 2025Updated 2 months ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 8 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 9 months ago
- ☆24Feb 1, 2025Updated last year
- ☆235Oct 8, 2024Updated last year
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆116Oct 20, 2024Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆95Feb 3, 2026Updated 3 weeks ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- ☆16Dec 7, 2025Updated 2 months ago
- ☆18Jan 26, 2026Updated last month
- ☆53Mar 26, 2025Updated 11 months ago
- Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)☆79Sep 29, 2024Updated last year
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆76Oct 27, 2025Updated 4 months ago
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- Template-based generation of shellcode loaders☆80Apr 20, 2024Updated last year
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆29Jun 17, 2022Updated 3 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated last month
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 7 months ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago