SpecterOps / BloodHound
Six Degrees of Domain Admin
☆1,569Updated this week
Alternatives and similar repositories for BloodHound:
Users that are interested in BloodHound are comparing it to the libraries listed below
- Tool for Active Directory Certificate Services enumeration and abuse☆2,690Updated 8 months ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,333Updated 2 weeks ago
- C# Data Collector for BloodHound☆891Updated last week
- Active Directory certificate abuse.☆1,643Updated 8 months ago
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆1,909Updated 3 weeks ago
- PingCastle - Get Active Directory Security at 80% in 20% of the time☆2,482Updated last month
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,288Updated last month
- A Python based ingestor for BloodHound☆2,077Updated 3 weeks ago
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of…☆2,113Updated last year
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,938Updated last month
- A collaborative, multi-platform, red teaming framework☆3,572Updated this week
- BloodyAD is an Active Directory Privilege Escalation Framework☆1,585Updated last week
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆1,983Updated 4 months ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,438Updated last week
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,122Updated this week
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,643Updated 5 months ago
- Trying to tame the three-headed dog.☆4,401Updated 2 weeks ago
- Dominate Active Directory with PowerShell. Inspired by CrackMapExec / NetExec.☆953Updated last month
- Dumping DPAPI credz remotely☆1,108Updated 3 weeks ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,949Updated last week
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆781Updated 2 weeks ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,805Updated last year
- Extract credentials from lsass remotely☆2,103Updated 3 months ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,079Updated 5 months ago
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆1,844Updated this week
- A tool to perform Kerberos pre-auth bruteforcing☆2,867Updated 8 months ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆1,905Updated last month
- The Network Execution Tool☆4,023Updated last week
- ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the…☆779Updated 6 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,470Updated 4 months ago