custom bloodhound queries and knowledge base
☆12Apr 16, 2024Updated last year
Alternatives and similar repositories for bloodhound-queries
Users that are interested in bloodhound-queries are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Jun 21, 2022Updated 3 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆40Mar 23, 2024Updated 2 years ago
- Impacket with --remove-mic-partial☆31Jan 8, 2026Updated 2 months ago
- Command line utilities for managing LDAP data.☆16Jan 15, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An attempt to automated hunting for delegation access across the domain☆27Jan 17, 2019Updated 7 years ago
- "top"-like tool for Cassandra☆21Apr 13, 2015Updated 10 years ago
- ☆11Feb 8, 2026Updated last month
- Public home for NIST open source software catalog☆19Mar 17, 2026Updated last week
- Precompiled binaries for windows & Linux☆33Jun 11, 2025Updated 9 months ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- .NET assembly loader with patching AMSI and ETW bypass☆31Apr 16, 2025Updated 11 months ago
- ☆19Jan 12, 2024Updated 2 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆20Mar 19, 2026Updated last week
- Simple Neo4j PowerShell Wrapper☆30Oct 24, 2019Updated 6 years ago
- Python CDK code for "Kubernetes The (real) Hard Way (AWS)"☆17Jul 25, 2023Updated 2 years ago
- ☆34Feb 23, 2026Updated last month
- Certipy in Docker☆13Mar 28, 2024Updated last year
- fatt tries to find any purl in your project by looking at predefined fields in the supported packages. These fields describe using a purl…☆11Mar 19, 2026Updated last week
- ☆16Oct 11, 2023Updated 2 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆59Feb 23, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Vulnerable Terraform Projects - Fork of https://github.com/bridgecrewio/terragoat☆17Apr 23, 2024Updated last year
- ☆16Apr 30, 2023Updated 2 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- A Cobaltstrike container, built for Warhorse☆41Aug 8, 2024Updated last year
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆40Oct 6, 2021Updated 4 years ago
- a stage1 DLL loader with sleep obfuscation☆36Dec 27, 2022Updated 3 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 7 months ago
- OWASP Foundation Web Respository☆20Feb 9, 2026Updated last month
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 3 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…☆183Mar 13, 2023Updated 3 years ago
- The Dumb Network Fuzzer☆21Jul 18, 2023Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆72Feb 11, 2024Updated 2 years ago
- Manage water levels in a reservoir by controlling water pumps.☆16Nov 6, 2023Updated 2 years ago
- ☆46Dec 5, 2023Updated 2 years ago
- An ongoing & curated collection of awesome web vulnerability - Server-side request forgery software practices and remediation, libraries…☆24Feb 22, 2022Updated 4 years ago