custom bloodhound queries and knowledge base
☆12Apr 16, 2024Updated 2 years ago
Alternatives and similar repositories for bloodhound-queries
Users that are interested in bloodhound-queries are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Jun 21, 2022Updated 3 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆40Updated this week
- Command line utilities for managing LDAP data.☆16Jan 15, 2025Updated last year
- An attempt to automated hunting for delegation access across the domain☆27Jan 17, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Impacket with --remove-mic-partial☆36Jan 8, 2026Updated 3 months ago
- "top"-like tool for Cassandra☆21Apr 13, 2015Updated 11 years ago
- ☆11Feb 8, 2026Updated 2 months ago
- Public home for NIST open source software catalog☆19Mar 26, 2026Updated 3 weeks ago
- Precompiled binaries for windows & Linux☆34Jun 11, 2025Updated 10 months ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- .NET assembly loader with patching AMSI and ETW bypass☆33Apr 16, 2025Updated last year
- ☆19Jan 12, 2024Updated 2 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆22Mar 19, 2026Updated 3 weeks ago
- Simple Neo4j PowerShell Wrapper☆30Oct 24, 2019Updated 6 years ago
- ☆35Feb 23, 2026Updated last month
- Python CDK code for "Kubernetes The (real) Hard Way (AWS)"☆17Jul 25, 2023Updated 2 years ago
- Certipy in Docker☆13Mar 28, 2024Updated 2 years ago
- fatt tries to find any purl in your project by looking at predefined fields in the supported packages. These fields describe using a purl…☆11Apr 9, 2026Updated last week
- ☆16Oct 11, 2023Updated 2 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆60Feb 23, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Vulnerable Terraform Projects - Fork of https://github.com/bridgecrewio/terragoat☆17Apr 23, 2024Updated last year
- ☆16Apr 30, 2023Updated 2 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- A Cobaltstrike container, built for Warhorse☆41Aug 8, 2024Updated last year
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆40Oct 6, 2021Updated 4 years ago
- a stage1 DLL loader with sleep obfuscation☆36Dec 27, 2022Updated 3 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆24Jul 31, 2025Updated 8 months ago
- OWASP Foundation Web Respository☆20Feb 9, 2026Updated 2 months ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…☆183Mar 13, 2023Updated 3 years ago
- The Dumb Network Fuzzer☆21Jul 18, 2023Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆74Feb 11, 2024Updated 2 years ago
- Manage water levels in a reservoir by controlling water pumps.☆16Nov 6, 2023Updated 2 years ago
- ☆46Dec 5, 2023Updated 2 years ago
- An ongoing & curated collection of awesome web vulnerability - Server-side request forgery software practices and remediation, libraries…☆24Feb 22, 2022Updated 4 years ago