SadProcessor / CypherDog
PoSh BloodHound Dog Whisperer
☆191Updated last year
Alternatives and similar repositories for CypherDog:
Users that are interested in CypherDog are comparing it to the libraries listed below
- ☆76Updated 3 years ago
- A Powershell module that helps you identify AppLocker weaknesses☆168Updated 5 years ago
- Material for the "Hands-On BloodHound" Workshop☆108Updated 4 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆145Updated 4 years ago
- ☆139Updated 5 years ago
- Python based BloodHound data importer☆147Updated last year
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆97Updated last year
- Assorted scripts and one off things☆268Updated 8 months ago
- A curated list of awesome BloodhoundAD resources☆230Updated 2 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆178Updated last year
- A PowerShell module to deploy active directory decoy objects.☆227Updated 5 years ago
- ☆257Updated 2 years ago
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆172Updated 6 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆248Updated 4 years ago
- Resources for our Active Directory security workshops☆140Updated 3 years ago
- Tool that automates Active Directory enumeration☆88Updated 4 years ago
- Lateral Movement graph for Azure Active Directory☆122Updated 2 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆187Updated 3 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆173Updated 6 years ago
- ☆162Updated 2 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆90Updated 3 years ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆123Updated last year
- Collection of cyphers for bloodhound☆150Updated 10 months ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆168Updated 4 years ago
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆154Updated 6 years ago
- Conveigh is a Windows PowerShell LLMNR/NBNS spoofer detection tool☆97Updated 8 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆320Updated 2 years ago
- Misc. PowerShell scripts☆117Updated 8 years ago
- Detect and abuse risky SPNs☆262Updated 7 years ago
- ☆94Updated 2 years ago