SadProcessor / BloodHoundOperator
BloodHound PowerShell client
β51Updated last week
Alternatives and similar repositories for BloodHoundOperator:
Users that are interested in BloodHoundOperator are comparing it to the libraries listed below
- π© οΈ Collection of BloodHound queries for Azureβ63Updated 3 months ago
- Microsoft Graph API post-exploitation toolkitβ94Updated 9 months ago
- Source code and examples for PassiveAggressionβ55Updated 10 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to β¦β25Updated 3 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!β86Updated 9 months ago
- Tool to extract username and password of current user from PanGPA in plaintextβ83Updated 3 months ago
- Example code samples from our ScriptBlock Smuggling Blog postβ90Updated 10 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSLβ40Updated 10 months ago
- β56Updated 3 weeks ago
- Living off the land searches for explorer and sharepointβ78Updated 5 months ago
- β41Updated last week
- β50Updated 5 months ago
- Lifetime AMSI bypass.β35Updated 9 months ago
- A Python POC for CRED1 over SOCKS5β147Updated 6 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous toolsβ88Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.β37Updated 4 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine withβ¦β75Updated 5 months ago
- β65Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.β55Updated last year
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)β41Updated last month
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.β80Updated 7 months ago
- Decrypt Veeam database passwordsβ158Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstalβ¦β34Updated 4 months ago
- Living Off the Foreign Land setup scriptsβ67Updated last month
- β43Updated 9 months ago
- Abuse Azure API permissions for red teamingβ64Updated 2 years ago
- PowerShell Reverse Shellβ61Updated last year
- β54Updated 2 months ago
- CaptainCredz is a modular and discreet password-spraying tool.β105Updated 2 weeks ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.β37Updated 2 months ago