LuemmelSec / Custom-BloodHound-Queries
☆176Updated 2 months ago
Alternatives and similar repositories for Custom-BloodHound-Queries:
Users that are interested in Custom-BloodHound-Queries are comparing it to the libraries listed below
- Azure AD cheatsheet for the CARTP course☆105Updated 2 years ago
- Automatically run and populate a new instance of BH CE☆64Updated 4 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆164Updated 5 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆143Updated 2 months ago
- ☆77Updated this week
- ☆132Updated 7 months ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆163Updated 5 months ago
- User Enumeration of Microsoft Teams users via API☆138Updated 10 months ago
- Identify the attack paths in BloodHound breaking your AD tiering☆314Updated 2 years ago
- Parses Snaffler output file and generate beautified outputs.☆71Updated 3 weeks ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆167Updated last year
- Hybrid AD utilities for ROADtools☆67Updated 3 weeks ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆161Updated 4 months ago
- ☆139Updated 3 months ago
- Abusing Intune for Lateral Movement over C2☆325Updated last week
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆110Updated 8 months ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆140Updated last year
- Azure Post Exploitation Framework☆167Updated 3 weeks ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆133Updated last month
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆106Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆187Updated 2 months ago
- A BloodHound collector for Microsoft Configuration Manager☆301Updated last month
- ☆100Updated 2 years ago
- ☆187Updated 4 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆177Updated 6 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- ☆134Updated 6 months ago
- ☆173Updated 2 months ago
- ☆191Updated last week