PlumHound / PlumHound-TasksView external linksLinks
Community Tasks/Plans for PlumHound Queueing
☆23Feb 3, 2023Updated 3 years ago
Alternatives and similar repositories for PlumHound-Tasks
Users that are interested in PlumHound-Tasks are comparing it to the libraries listed below
Sorting:
- ELK stack for red team logs☆13Oct 30, 2020Updated 5 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Defensive Origins Training Schedule☆39Dec 11, 2023Updated 2 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- Adversary Simulation Framework☆38Aug 19, 2025Updated 5 months ago
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- Parse scan results into python objects, i.e. Nessus, Nmap, testssl, metasploit, ...☆23Jan 4, 2020Updated 6 years ago
- A docker container for running the hashcat brain server☆25May 14, 2019Updated 6 years ago
- ☆10Feb 5, 2026Updated last week
- ☆80Nov 21, 2019Updated 6 years ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆34Jun 28, 2022Updated 3 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated last month
- Repository containing machine solving attempts and results generated by BoxPwnr☆15Feb 10, 2026Updated last week
- Searches for interesting cached DNS entries.☆55May 15, 2014Updated 11 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41May 17, 2019Updated 6 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- ☆12Feb 16, 2012Updated 14 years ago
- BH Cypher Queries picked up from random places☆41Dec 12, 2018Updated 7 years ago
- To host ProcessMaker v3 Community Editions☆10Jun 18, 2024Updated last year
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 2 months ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- windows Local privilege escalation for xp sp3+ (x86/x64)☆12Oct 26, 2017Updated 8 years ago
- ☆13Feb 2, 2026Updated 2 weeks ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- An OpenAPI specification for the Rocket.Chat API.☆10Updated this week
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- ☆13Jun 26, 2025Updated 7 months ago
- A BugBounty playbook covering vulnerability bypasses, payloads, and quick checks for OWASP Top 10 + extras.☆22Sep 29, 2025Updated 4 months ago
- SANS #CTI Summit 2025☆13Jan 28, 2025Updated last year
- ☆16Sep 9, 2025Updated 5 months ago
- 🌈 Render PowerShell in the Terminal with Syntax Highlighting☆10May 25, 2023Updated 2 years ago
- ☆12Feb 8, 2023Updated 3 years ago
- This is a repo for a Power Automate cloud flow solution that allows the user to summarise Teams transcripts using GPT4.☆14Feb 24, 2025Updated 11 months ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago