A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing SharpHound and AzureHound data.
☆75Feb 27, 2026Updated 3 weeks ago
Alternatives and similar repositories for golinhound
Users that are interested in golinhound are comparing it to the libraries listed below
Sorting:
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated 2 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆32Dec 31, 2025Updated 2 months ago
- Notion C2 Profile for Mythic☆35Mar 3, 2026Updated 2 weeks ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 6 months ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆66Feb 17, 2026Updated last month
- CyberFind — a next-generation OSINT reconnaissance tool designed for cybersecurity professionals, penetration testers, and digital invest…☆59Updated this week
- Red Team tools containerized☆76Dec 6, 2025Updated 3 months ago
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆43Aug 10, 2025Updated 7 months ago
- A tool to play with scheduled tasks on Windows, in Rust☆122Nov 1, 2025Updated 4 months ago
- PowerShell Module to find compatible FIDO2 keys for Entra☆18Updated this week
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆288Jan 12, 2026Updated 2 months ago
- Zero-dependency Linux memory forensics PoC — leverages kernel-embedded BTF and kallsyms for type-aware memory analysis without external d…☆108Updated this week
- kerberos in rust for fun and profit☆51Mar 13, 2026Updated last week
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Aug 26, 2022Updated 3 years ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated 2 months ago
- Overview of MS Defender☆118Feb 20, 2026Updated last month
- A prototype for implementing Azure Service Principal Impersonation using Azure Functions and Key Vault. This project demonstrates an appr…☆17Feb 26, 2025Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 8 months ago
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated last year
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆14Jan 4, 2026Updated 2 months ago
- Bring your own Unwind Data Framework☆77Mar 15, 2026Updated last week
- Open KLara Project☆36Feb 12, 2026Updated last month
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆69Feb 5, 2026Updated last month
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- ClickForClickOnce - Generate configurable clickonce payloads☆92Oct 10, 2025Updated 5 months ago
- A Qemu Proxmox Template builder project using Packer☆72Dec 5, 2025Updated 3 months ago
- Hackers Cookbook - Tons of hacker cli recipes ready to search and use when you need them☆42Mar 12, 2026Updated last week
- Azure apim mini proxy☆54Feb 16, 2026Updated last month
- A scanner for the FortiNet vulnerability CVE-2025-64446☆30Nov 18, 2025Updated 4 months ago
- Python tool to automatically perform SPN-less RBCD attacks.☆124Jan 7, 2026Updated 2 months ago
- ☆28Mar 14, 2026Updated last week
- Time2Vec neural network components. From paper: "Time2Vec: Learning a Vector Representation of Time" - https://arxiv.org/pdf/1907.05321.p…☆10Nov 25, 2024Updated last year
- A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, wit…☆282Feb 21, 2026Updated last month
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- ACL Viewer for Windows☆133May 4, 2025Updated 10 months ago
- ☆10Jul 1, 2023Updated 2 years ago