LuemmelSec / Custom-BloodHound-Queries
☆178Updated 3 months ago
Alternatives and similar repositories for Custom-BloodHound-Queries:
Users that are interested in Custom-BloodHound-Queries are comparing it to the libraries listed below
- ☆85Updated last week
- Azure AD cheatsheet for the CARTP course☆108Updated 2 years ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆168Updated 6 months ago
- Automatically run and populate a new instance of BH CE☆69Updated last week
- ☆135Updated 8 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆167Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆144Updated 3 months ago
- Hybrid AD utilities for ROADtools☆72Updated last month
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆141Updated last year
- Parses Snaffler output file and generate beautified outputs.☆88Updated last month
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆136Updated last month
- User Enumeration of Microsoft Teams users via API☆148Updated 11 months ago
- Identify the attack paths in BloodHound breaking your AD tiering☆317Updated 2 years ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆230Updated last year
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆110Updated 9 months ago
- Abusing Intune for Lateral Movement over C2☆327Updated last month
- Azure Post Exploitation Framework☆188Updated 3 weeks ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆166Updated 6 months ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆163Updated 5 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆200Updated 3 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Make everyone in your VLAN ASRep roastable☆185Updated 3 weeks ago
- Malware As A Service☆132Updated last year
- ☆190Updated 6 months ago
- Identifies the bytes that Microsoft Defender flags on.☆84Updated 2 years ago
- ☆141Updated 4 months ago
- ☆174Updated 3 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆173Updated 2 years ago
- ☆158Updated 4 months ago
- Some scripts to abuse kerberos using Powershell☆328Updated last year