LuemmelSec / Custom-BloodHound-Queries
☆178Updated 5 months ago
Alternatives and similar repositories for Custom-BloodHound-Queries:
Users that are interested in Custom-BloodHound-Queries are comparing it to the libraries listed below
- Azure AD cheatsheet for the CARTP course☆114Updated 3 years ago
- Automatically run and populate a new instance of BH CE☆75Updated last week
- ☆89Updated last week
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆172Updated 8 months ago
- ☆142Updated last month
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆145Updated 4 months ago
- Identify the attack paths in BloodHound breaking your AD tiering☆320Updated 2 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165Updated last year
- Hybrid AD utilities for ROADtools☆74Updated 3 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆183Updated 8 months ago
- Azure Post Exploitation Framework☆197Updated 2 months ago
- User Enumeration of Microsoft Teams users via API☆156Updated last year
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆192Updated 7 months ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆143Updated last year
- Parses Snaffler output file and generate beautified outputs.☆95Updated 3 months ago
- ☆139Updated 8 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Abusing Intune for Lateral Movement over C2☆334Updated 2 months ago
- Malware As A Service☆132Updated last year
- A tool for pointesters to find candies in SharePoint☆254Updated 2 years ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆210Updated 4 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated last year
- ☆100Updated 2 years ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆241Updated last month
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆175Updated 2 years ago
- Retired TrustedSec Capabilities☆247Updated 5 months ago
- ☆191Updated 7 months ago
- Make everyone in your VLAN ASRep roastable☆190Updated 2 months ago
- Some scripts to abuse kerberos using Powershell☆328Updated last year
- ☆98Updated 3 years ago