BloodHound PowerShell client
☆77Dec 10, 2025Updated 2 months ago
Alternatives and similar repositories for BloodHoundOperator
Users that are interested in BloodHoundOperator are comparing it to the libraries listed below
Sorting:
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆72Updated this week
- ☆19Aug 26, 2020Updated 5 years ago
- ☆235Oct 8, 2024Updated last year
- ☆11Oct 24, 2022Updated 3 years ago
- Generate and Manage KeyCredentialLinks☆248Jan 30, 2026Updated last month
- ☆94Dec 9, 2025Updated 2 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- ☆160Jan 27, 2025Updated last year
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆638May 8, 2025Updated 9 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆211Jun 10, 2024Updated last year
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Feb 20, 2023Updated 3 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Situational Awareness script to identify how and where to run implants☆68Dec 6, 2024Updated last year
- ☆147Oct 29, 2024Updated last year
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆275Dec 27, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆346Nov 19, 2024Updated last year
- ☆59Oct 24, 2024Updated last year
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- A BloodHound collector for Microsoft Configuration Manager☆391Jul 7, 2025Updated 7 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆93Apr 27, 2025Updated 10 months ago
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆656Jan 16, 2026Updated last month
- PDF dropper Red Team Scenairos☆227Jul 31, 2024Updated last year
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆537May 9, 2025Updated 9 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Dec 7, 2024Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆261Nov 22, 2025Updated 3 months ago
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Dec 18, 2023Updated 2 years ago
- ☆198Aug 28, 2025Updated 6 months ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- ☆290Jul 20, 2023Updated 2 years ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆236Aug 25, 2024Updated last year
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆207Jan 12, 2025Updated last year
- A robust Windows Process Executable Packer and Launcher implementation written in Rust for Windows x64 systems.☆42Jan 9, 2025Updated last year
- execute PE in memory Filelessly☆51Feb 8, 2025Updated last year
- ☆250Jul 31, 2024Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago