SadProcessor / CypherDog
PoSh BloodHound Dog Whisperer
☆189Updated last year
Alternatives and similar repositories for CypherDog:
Users that are interested in CypherDog are comparing it to the libraries listed below
- Material for the "Hands-On BloodHound" Workshop☆108Updated 3 years ago
- ☆76Updated 3 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆145Updated 4 years ago
- Python based BloodHound data importer☆146Updated last year
- A curated list of awesome BloodhoundAD resources☆231Updated 2 years ago
- A Powershell module that helps you identify AppLocker weaknesses☆166Updated 5 years ago
- Assorted scripts and one off things☆266Updated 7 months ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆177Updated last year
- ☆257Updated 2 years ago
- Collection of cyphers for bloodhound☆148Updated 8 months ago
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆97Updated last year
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆217Updated last year
- ☆167Updated 5 years ago
- ☆139Updated 5 years ago
- Resources for our Active Directory security workshops☆140Updated 3 years ago
- ☆162Updated 2 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆173Updated 6 years ago
- Detect and abuse risky SPNs☆260Updated 7 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆167Updated 4 years ago
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆170Updated 6 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆216Updated 4 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆184Updated 3 years ago
- ☆151Updated 3 years ago
- A PowerShell module to deploy active directory decoy objects.☆225Updated 5 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆317Updated 2 years ago
- Lateral Movement graph for Azure Active Directory☆120Updated 2 years ago
- Powershell function to pull the local admin passwords from LDAP, stored there by LAPS.☆118Updated 5 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆90Updated 3 years ago
- Tool that automates Active Directory enumeration☆89Updated 3 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆217Updated 4 years ago