InfamousSYN / bloodhound-queriesView external linksLinks
custom bloodhound queries and knowledge base
☆12Apr 16, 2024Updated last year
Alternatives and similar repositories for bloodhound-queries
Users that are interested in bloodhound-queries are comparing it to the libraries listed below
Sorting:
- ☆22Jun 21, 2022Updated 3 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- A Cobaltstrike container, built for Warhorse☆40Aug 8, 2024Updated last year
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆40Mar 23, 2024Updated last year
- a stage1 DLL loader with sleep obfuscation☆36Dec 27, 2022Updated 3 years ago
- Simple Neo4j PowerShell Wrapper☆30Oct 24, 2019Updated 6 years ago
- Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2☆51Oct 4, 2023Updated 2 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- Flexible C# shellcode runner☆39Jan 18, 2022Updated 4 years ago
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Jul 24, 2023Updated 2 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- NTAPI hook bypass with (semi) legit stack trace☆18May 9, 2023Updated 2 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- Manage water levels in a reservoir by controlling water pumps.☆16Nov 6, 2023Updated 2 years ago
- ☆46Dec 5, 2023Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆50May 3, 2022Updated 3 years ago
- Leonardo-Arduino script and python keylogger for BAD-USB aka Poor Man's RUBBER-DUCKY☆12Aug 14, 2020Updated 5 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- ☆13Feb 25, 2023Updated 2 years ago
- Aggressor Notification Scripts for cobaltstrike via slack & discord☆14Nov 27, 2025Updated 2 months ago
- ☆11Updated this week
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- ☆16Jun 15, 2025Updated 7 months ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- Ansible playbook for configuring Kali Linux to personal preferences☆10Oct 5, 2022Updated 3 years ago
- Threat Hijacking Simple Implementation☆18Feb 24, 2025Updated 11 months ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated 11 months ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- Impacket with --remove-mic-partial☆28Jan 8, 2026Updated last month
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 5 months ago
- ☆12Oct 19, 2024Updated last year
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- fatt tries to find any purl in your project by looking at predefined fields in the supported packages. These fields describe using a purl…☆11Jan 26, 2026Updated 2 weeks ago
- OSCP preparation☆12Sep 18, 2025Updated 4 months ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago