Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.
☆20Jan 12, 2019Updated 7 years ago
Alternatives and similar repositories for bloodhound-elementary
Users that are interested in bloodhound-elementary are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of resources that I've used to learn things☆14Aug 31, 2021Updated 4 years ago
- ELK stack for red team logs☆13Oct 30, 2020Updated 5 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Feb 3, 2023Updated 3 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Oct 3, 2022Updated 3 years ago
- BH Cypher Queries picked up from random places☆41Dec 12, 2018Updated 7 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 11 years ago
- This script sets up or updates a host to connect to a tinc vpn. It allows you to start a network from scratch, join an existing network, …☆21May 17, 2017Updated 8 years ago
- DLL Injector as a service that watches the health of the started thread.☆10Feb 3, 2020Updated 6 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago
- This is a patched version of ExchangeRelayX☆14Aug 13, 2020Updated 5 years ago
- A parser to extract information from .nessus file format☆23Mar 26, 2021Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- Nessus Parser☆59Oct 27, 2017Updated 8 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- An utility tool to run application release-checklist safely☆14Apr 26, 2020Updated 5 years ago
- ☆11Nov 14, 2022Updated 3 years ago
- ☆14Dec 4, 2021Updated 4 years ago
- Burp Suite extension to discover assets from HTTP response.☆16May 18, 2021Updated 4 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 5 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14May 29, 2021Updated 4 years ago
- My customized docker image used for binary exploitation and RE☆14Jul 3, 2021Updated 4 years ago
- Zabbix Template - Get Daily, Monthly and Alltime Bandwidth Information /w Triggers☆12Nov 17, 2021Updated 4 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16May 28, 2022Updated 3 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Dec 10, 2022Updated 3 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 3 years ago
- Linux rust keylogger☆18Mar 1, 2024Updated 2 years ago
- DCS World Mod Manager☆11May 21, 2025Updated 10 months ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- ☆10Updated this week
- Generate vanity / gas efficient Ethereum addresses for your hdwallet (bip39 12 or 24 words)☆15Sep 7, 2023Updated 2 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- ☆13Mar 15, 2022Updated 4 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- Threat Simulation Indexes☆39Jan 9, 2026Updated 2 months ago
- How to install Kali in VirtualBox☆14May 3, 2024Updated last year
- My little birds are everywhere. Even in the North. They whisper to me, the strangest stories☆23May 22, 2023Updated 2 years ago