BloodHound PowerShell client
☆79Dec 10, 2025Updated 3 months ago
Alternatives and similar repositories for BloodHoundOperator
Users that are interested in BloodHoundOperator are comparing it to the libraries listed below
Sorting:
- A python library to create BloodHound OpenGraphs☆56Feb 4, 2026Updated last month
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆276Dec 27, 2024Updated last year
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆78Mar 13, 2026Updated last week
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- ☆94Dec 9, 2025Updated 3 months ago
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- ☆160Jan 27, 2025Updated last year
- ☆234Oct 8, 2024Updated last year
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆75Feb 27, 2026Updated 3 weeks ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆211Jun 10, 2024Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆640May 8, 2025Updated 10 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Generate and Manage KeyCredentialLinks☆253Mar 9, 2026Updated last week
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- ☆12Oct 24, 2022Updated 3 years ago
- ☆147Oct 29, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆346Nov 19, 2024Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆265Nov 22, 2025Updated 3 months ago
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆657Jan 16, 2026Updated 2 months ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆44Dec 19, 2025Updated 3 months ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆238Aug 25, 2024Updated last year
- ☆291Jul 20, 2023Updated 2 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆42Updated this week
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Feb 20, 2023Updated 3 years ago
- ☆199Aug 28, 2025Updated 6 months ago
- A BloodHound collector for Microsoft Configuration Manager☆393Jul 7, 2025Updated 8 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆541May 9, 2025Updated 10 months ago
- Token impersonation in PowerShell to execute under the context of another user.☆24Oct 14, 2025Updated 5 months ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆126Sep 12, 2024Updated last year
- ☆79Aug 5, 2024Updated last year
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- PDF dropper Red Team Scenairos☆229Jul 31, 2024Updated last year
- CVE-2022-37042 Zimbra Auth Bypass leads to RCE☆30Dec 9, 2022Updated 3 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆166Dec 7, 2024Updated last year