LuemmelSec / Custom-BloodHound-QueriesLinks
☆184Updated last year
Alternatives and similar repositories for Custom-BloodHound-Queries
Users that are interested in Custom-BloodHound-Queries are comparing it to the libraries listed below
Sorting:
- ☆186Updated last month
- Azure AD cheatsheet for the CARTP course☆143Updated 3 years ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆231Updated last year
- Automatically run and populate a new instance of BH CE☆113Updated this week
- User Enumeration of Microsoft Teams users via API☆184Updated last year
- ☆154Updated 10 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Updated last year
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆116Updated last year
- Hybrid AD utilities for ROADtools☆105Updated 8 months ago
- Abusing Azure services over C2☆367Updated last week
- 🌩️ Collection of BloodHound queries for Azure☆82Updated last year
- A tool for pointesters to find candies in SharePoint☆277Updated 3 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- Retired TrustedSec Capabilities☆248Updated 3 weeks ago
- ☆198Updated 7 months ago
- Some scripts to abuse kerberos using Powershell☆355Updated 2 years ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆175Updated 6 months ago
- Parses Snaffler output file and generate beautified outputs.☆132Updated 3 weeks ago
- ☆105Updated 2 years ago
- Azure Post Exploitation Framework☆244Updated 3 months ago
- ☆164Updated 7 months ago
- ☆197Updated 5 months ago
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆127Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258Updated 3 years ago
- Malware As A Service☆137Updated last year
- ☆229Updated 7 months ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆259Updated 2 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆206Updated last year
- Identify the attack paths in BloodHound breaking your AD tiering☆326Updated 3 years ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago