SpecterOps / BloodHoundLinks
Six Degrees of Domain Admin
☆2,506Updated this week
Alternatives and similar repositories for BloodHound
Users that are interested in BloodHound are comparing it to the libraries listed below
Sorting:
- The Network Execution Tool☆4,884Updated this week
- Tool for Active Directory Certificate Services enumeration and abuse☆3,228Updated last month
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆1,987Updated last week
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,597Updated last month
- PingCastle - Get Active Directory Security at 80% in 20% of the time☆2,666Updated last month
- Trying to tame the three-headed dog.☆4,709Updated 2 months ago
- C# Data Collector for BloodHound☆1,098Updated last week
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,449Updated 7 months ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆1,959Updated last week
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,008Updated 5 months ago
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆2,205Updated this week
- Active Directory certificate abuse.☆1,845Updated last week
- A collaborative, multi-platform, red teaming framework☆4,074Updated last week
- A Python based ingestor for BloodHound☆2,273Updated 2 weeks ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,106Updated last week
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,118Updated 2 months ago
- Privilege Escalation Enumeration Script for Windows☆3,522Updated last month
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of…☆2,197Updated 2 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,352Updated 9 months ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,033Updated 10 months ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,223Updated 3 months ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,444Updated this week
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,767Updated last year
- A tool to perform Kerberos pre-auth bruteforcing☆3,100Updated last year
- Orange Cyberdefense mindmaps☆1,475Updated 7 months ago
- Dominate Active Directory with PowerShell.☆1,083Updated last week
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,885Updated 2 months ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,677Updated 2 weeks ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,327Updated 2 years ago
- Dumping DPAPI credz remotely☆1,265Updated 7 months ago