SadProcessor / CypherDogLinks
PoSh BloodHound Dog Whisperer
☆191Updated 2 years ago
Alternatives and similar repositories for CypherDog
Users that are interested in CypherDog are comparing it to the libraries listed below
Sorting:
- ☆76Updated 3 years ago
- Material for the "Hands-On BloodHound" Workshop☆109Updated 4 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆146Updated 4 years ago
- Python based BloodHound data importer☆147Updated last year
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆178Updated last year
- A Powershell module that helps you identify AppLocker weaknesses☆168Updated 5 years ago
- A curated list of awesome BloodhoundAD resources☆230Updated 2 years ago
- ☆140Updated 5 years ago
- ☆257Updated 2 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆188Updated 3 years ago
- Detect and abuse risky SPNs☆262Updated 8 years ago
- A PowerShell module to deploy active directory decoy objects.☆231Updated 5 years ago
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆154Updated 6 years ago
- Tool that automates Active Directory enumeration☆88Updated 4 years ago
- ☆169Updated 5 years ago
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆97Updated last year
- Resources for our Active Directory security workshops☆139Updated 3 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆248Updated 4 years ago
- Assorted scripts and one off things☆270Updated 10 months ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆221Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆257Updated 3 years ago
- Collection of cyphers for bloodhound☆150Updated 11 months ago
- ☆162Updated 2 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆166Updated 4 years ago
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆170Updated 6 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆93Updated 3 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆173Updated 6 years ago
- Lateral Movement graph for Azure Active Directory☆122Updated 2 years ago
- Misc. PowerShell scripts☆117Updated 8 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆321Updated 2 years ago