A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing SharpHound and AzureHound data.
☆85Apr 10, 2026Updated 3 weeks ago
Alternatives and similar repositories for golinhound
Users that are interested in golinhound are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆77Apr 11, 2026Updated 2 weeks ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆15Jan 10, 2026Updated 3 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 4 months ago
- Notion C2 Profile for Mythic☆45Mar 3, 2026Updated last month
- Windows Access token manipulation tool made in C#☆25Aug 24, 2025Updated 8 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- test☆61Updated this week
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆69Feb 17, 2026Updated 2 months ago
- ExchangeHound is a defensive BloodHound OpenGraph collector for on-prem Microsoft Exchange that maps mailbox delegation and Exchange priv…☆68Apr 17, 2026Updated 2 weeks ago
- A Ligolo-ng JavaScript agent working inside Chrome & Chromium-based browsers by leveraging Isolated Web Applications.☆126Mar 30, 2026Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆88Mar 6, 2025Updated last year
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆45Aug 10, 2025Updated 8 months ago
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆58Jul 2, 2025Updated 9 months ago
- A tool to play with scheduled tasks on Windows, in Rust☆123Nov 1, 2025Updated 6 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- PowerShell Module to find compatible FIDO2 keys for Entra☆18Updated this week
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆294Mar 29, 2026Updated last month
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Aug 26, 2022Updated 3 years ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 9 months ago
- kerberos in rust for fun and profit☆71Mar 13, 2026Updated last month
- TLS fingerprint emulation upstream proxy replay any ClientHello☆43Apr 6, 2026Updated 3 weeks ago
- A prototype for implementing Azure Service Principal Impersonation using Azure Functions and Key Vault. This project demonstrates an appr…☆17Feb 26, 2025Updated last year
- Opengraph-Compatible JSON Generator for BloodHound☆28Mar 30, 2026Updated last month
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- Overview of MS Defender☆139Feb 20, 2026Updated 2 months ago
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆107Apr 22, 2026Updated last week
- load arbitrary dlls, call any exported function, calls execute inside g0 as normal syscalls do from the traditional route, no syscall or …☆28Feb 18, 2026Updated 2 months ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- Boot-to-Breach red team lab on AWS. Mythic, Sliver, and Havoc C2 behind a production-style Apache redirector. Deployed via Terraform, to …☆192Updated this week
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆70Mar 17, 2025Updated last year
- Zero-dependency Linux memory forensics PoC — leverages kernel-embedded BTF and kallsyms for type-aware memory analysis without external d…☆144Updated this week
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆96Dec 9, 2025Updated 4 months ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆17Jan 4, 2026Updated 3 months ago
- A bot designed to track rewards and manage PocketNetwork nodes☆11Apr 14, 2022Updated 4 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- Azure Post Exploitation Framework☆246Oct 27, 2025Updated 6 months ago
- Open KLara Project☆35Feb 12, 2026Updated 2 months ago