A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing SharpHound and AzureHound data.
☆85Apr 25, 2026Updated 3 weeks ago
Alternatives and similar repositories for golinhound
Users that are interested in golinhound are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆81Apr 11, 2026Updated last month
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆15Jan 10, 2026Updated 4 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 4 months ago
- Notion C2 Profile for Mythic☆46Apr 30, 2026Updated 3 weeks ago
- Windows Access token manipulation tool made in C#☆25Aug 24, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆70Feb 17, 2026Updated 3 months ago
- test☆104Apr 25, 2026Updated 3 weeks ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆70Mar 17, 2025Updated last year
- ExportHider: Generating Export Table during Runtime to Hide the Exported Functions from the DLL File.☆33Apr 12, 2026Updated last month
- A Ligolo-ng JavaScript agent working inside Chrome & Chromium-based browsers by leveraging Isolated Web Applications.☆127Mar 30, 2026Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆88Mar 6, 2025Updated last year
- Red Team tools containerized☆77May 12, 2026Updated last week
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆46Aug 10, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆58Jul 2, 2025Updated 10 months ago
- A tool to play with scheduled tasks on Windows, in Rust☆123Nov 1, 2025Updated 6 months ago
- PowerShell Module to find compatible FIDO2 keys for Entra☆18May 14, 2026Updated last week
- Kali configuration optimized for red teaming/pentesting/CTFs☆21Oct 20, 2023Updated 2 years ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆297Mar 29, 2026Updated last month
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Aug 26, 2022Updated 3 years ago
- A headless MCP server for IDA Pro and Ghidra☆85May 5, 2026Updated 2 weeks ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 10 months ago
- kerberos in rust for fun and profit☆73Mar 13, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- TLS fingerprint emulation upstream proxy replay any ClientHello☆47Apr 6, 2026Updated last month
- A prototype for implementing Azure Service Principal Impersonation using Azure Functions and Key Vault. This project demonstrates an appr…☆17Feb 26, 2025Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 10 months ago
- Opengraph-Compatible JSON Generator for BloodHound☆28Mar 30, 2026Updated last month
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- Overview of MS Defender☆141Feb 20, 2026Updated 3 months ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- load arbitrary dlls, call any exported function, calls execute inside g0 as normal syscalls do from the traditional route, no syscall or …☆28May 4, 2026Updated 2 weeks ago
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆120Apr 22, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆131Jan 14, 2023Updated 3 years ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 5 months ago
- Zero-dependency Linux memory forensics PoC — leverages kernel-embedded BTF and kallsyms for type-aware memory analysis without external d…☆156Updated this week
- ☆96Apr 27, 2026Updated 3 weeks ago
- Serverless Redirector in various cloud vendor for red team☆73Dec 8, 2022Updated 3 years ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago