LuemmelSec / Custom-BloodHound-QueriesLinks
☆184Updated last year
Alternatives and similar repositories for Custom-BloodHound-Queries
Users that are interested in Custom-BloodHound-Queries are comparing it to the libraries listed below
Sorting:
- ☆193Updated last month
- Automatically run and populate a new instance of BH CE☆113Updated 2 weeks ago
- Azure AD cheatsheet for the CARTP course☆146Updated 3 years ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆232Updated last year
- ☆154Updated 10 months ago
- User Enumeration of Microsoft Teams users via API☆184Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Updated last year
- Hybrid AD utilities for ROADtools☆106Updated 8 months ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆117Updated last year
- ☆197Updated 5 months ago
- Parses Snaffler output file and generate beautified outputs.☆132Updated last month
- Abusing Azure services over C2☆368Updated 3 weeks ago
- A tool for pointesters to find candies in SharePoint☆277Updated 3 years ago
- ☆166Updated 7 months ago
- Identify the attack paths in BloodHound breaking your AD tiering☆326Updated 3 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- 🌩️ Collection of BloodHound queries for Azure☆82Updated last year
- Azure Post Exploitation Framework☆244Updated 3 months ago
- Some scripts to abuse kerberos using Powershell☆355Updated 2 years ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆175Updated 7 months ago
- ☆280Updated 5 months ago
- Retired TrustedSec Capabilities☆248Updated last month
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆204Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆206Updated last year
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆46Updated 4 months ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- Malware As A Service☆137Updated last year
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258Updated 3 years ago
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆127Updated 3 years ago
- ☆230Updated 8 months ago