custom bloodhound queries and knowledge base
☆12Apr 16, 2024Updated last year
Alternatives and similar repositories for bloodhound-queries
Users that are interested in bloodhound-queries are comparing it to the libraries listed below
Sorting:
- ☆22Jun 21, 2022Updated 3 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- A Cobaltstrike container, built for Warhorse☆41Aug 8, 2024Updated last year
- a stage1 DLL loader with sleep obfuscation☆36Dec 27, 2022Updated 3 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆40Mar 23, 2024Updated last year
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆40Oct 6, 2021Updated 4 years ago
- Simple Neo4j PowerShell Wrapper☆30Oct 24, 2019Updated 6 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- Manage water levels in a reservoir by controlling water pumps.☆16Nov 6, 2023Updated 2 years ago
- Flexible C# shellcode runner☆39Jan 18, 2022Updated 4 years ago
- Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2☆52Feb 25, 2026Updated last week
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Jul 24, 2023Updated 2 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- ☆46Dec 5, 2023Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- OSCP preparation☆12Sep 18, 2025Updated 5 months ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- Aggressor Notification Scripts for cobaltstrike via slack & discord☆14Nov 27, 2025Updated 3 months ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- ☆16Jun 15, 2025Updated 8 months ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Leonardo-Arduino script and python keylogger for BAD-USB aka Poor Man's RUBBER-DUCKY☆12Aug 14, 2020Updated 5 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 6 months ago
- fatt tries to find any purl in your project by looking at predefined fields in the supported packages. These fields describe using a purl…☆11Jan 26, 2026Updated last month
- Ansible playbook for configuring Kali Linux to personal preferences☆10Oct 5, 2022Updated 3 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated last year
- Threat Hijacking Simple Implementation☆18Feb 24, 2025Updated last year
- ☆11Feb 8, 2026Updated 3 weeks ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- ☆12Oct 19, 2024Updated last year
- ☆13Feb 25, 2023Updated 3 years ago