☆123Mar 14, 2026Updated last week
Alternatives and similar repositories for GitHound
Users that are interested in GitHound are comparing it to the libraries listed below
Sorting:
- Powershell and python utilties for Entra Connect☆29Jun 5, 2025Updated 9 months ago
- This cheatsheet maps common impacket workflows to their modern alternatives☆56Updated this week
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆109Dec 3, 2025Updated 3 months ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 7 months ago
- Awesome MalDev Links☆52Updated this week
- ☆48Dec 5, 2025Updated 3 months ago
- ☆18Jun 10, 2025Updated 9 months ago
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 6 months ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆40Dec 5, 2025Updated 3 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆75Feb 27, 2026Updated 3 weeks ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆167Nov 2, 2025Updated 4 months ago
- Offensive security toolkit for Claude Code☆70Updated this week
- A collection of python scripts to work with Windows Hives.☆23Oct 15, 2025Updated 5 months ago
- A python wrapper to run a command on against all users/computers/DCs of a Windows Domain☆31Sep 24, 2022Updated 3 years ago
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆190Mar 4, 2026Updated 2 weeks ago
- Hybrid AD utilities for ROADtools☆108May 25, 2025Updated 9 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- ☆56Mar 13, 2026Updated last week
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆78Oct 27, 2025Updated 4 months ago
- Interactive CRQ Monte Carlo simulation tool for quantifying cybersecurity risk using FAIR methodology. Built for EU SMBs, vCISOs, and sec…☆30Dec 5, 2025Updated 3 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 10 months ago
- ☆234Oct 8, 2024Updated last year
- ☆139Nov 17, 2025Updated 4 months ago
- SCEP request tool for AD CS and Intune☆74Oct 24, 2025Updated 4 months ago
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Feb 11, 2025Updated last year
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 7 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- ☆20Apr 10, 2025Updated 11 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆199Nov 4, 2025Updated 4 months ago
- HTML parser for PEAS output with additional features☆137Feb 15, 2026Updated last month
- Scripts that automate portions of pentests.☆58Mar 4, 2026Updated 2 weeks ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- A multithreaded bruteforcer of argon2 hashes.☆44Jun 4, 2025Updated 9 months ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 5 months ago
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 7 months ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆88Feb 9, 2026Updated last month
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆121Sep 2, 2025Updated 6 months ago