Notebooks created to attack and secure Active Directory environments
☆27Nov 18, 2019Updated 6 years ago
Alternatives and similar repositories for bloodhound-notebooks
Users that are interested in bloodhound-notebooks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- A simple utility to check the status of and/or disable SMBv1 on Windows system via Cb Response's Live Response functionality.☆15May 28, 2019Updated 6 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- A Darktrace CLI written in Python☆16Nov 28, 2019Updated 6 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆35Jun 22, 2021Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- ☆16May 13, 2021Updated 4 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Feb 20, 2018Updated 8 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- ☆12May 12, 2022Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆12Nov 23, 2022Updated 3 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- Azure Sentinel Template parser☆16Nov 2, 2020Updated 5 years ago
- Program to leak anti-virus behaviour and such☆14Apr 18, 2019Updated 6 years ago
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆31Jun 5, 2023Updated 2 years ago
- Sign a previously signed .IPA with your provisioning profile☆11Sep 27, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- ☆19Jun 16, 2021Updated 4 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆20Aug 23, 2019Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Nov 17, 2025Updated 4 months ago
- ☆16May 9, 2016Updated 9 years ago
- QEMU with rVMI extensions☆25Jul 25, 2017Updated 8 years ago
- GeoIP plotting script written in Python to help security teams draw visualized reports from IP addresses☆20May 29, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 3 years ago
- Bulk hostname lookup using shodan☆13Jun 1, 2022Updated 3 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Apr 19, 2019Updated 6 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41May 17, 2019Updated 6 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago