☆108Feb 21, 2026Updated last week
Alternatives and similar repositories for GitHound
Users that are interested in GitHound are comparing it to the libraries listed below
Sorting:
- Powershell and python utilties for Entra Connect☆28Jun 5, 2025Updated 8 months ago
- ☆47Dec 5, 2025Updated 2 months ago
- Awesome MalDev Links☆39Updated this week
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 5 months ago
- A tool to encode and decode content as whitespace☆18Sep 24, 2023Updated 2 years ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 6 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆163Nov 2, 2025Updated 3 months ago
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆105Dec 3, 2025Updated 2 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 9 months ago
- ☆138Nov 17, 2025Updated 3 months ago
- Hybrid AD utilities for ROADtools☆108May 25, 2025Updated 9 months ago
- ☆235Oct 8, 2024Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- SCEP request tool for AD CS and Intune☆73Oct 24, 2025Updated 4 months ago
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆189Feb 10, 2026Updated 2 weeks ago
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 7 months ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆76Oct 27, 2025Updated 4 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 7 months ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆26Nov 23, 2025Updated 3 months ago
- ☆150Feb 7, 2026Updated 3 weeks ago
- Weaponizing DCOM for NTLM Authentication Coercions☆197Nov 4, 2025Updated 3 months ago
- Scripts that automate portions of pentests.☆57Feb 13, 2026Updated 2 weeks ago
- CyberShield 2025 Intro to EDR Evasion Class☆17Jun 3, 2025Updated 8 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 6 months ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆124Feb 14, 2026Updated 2 weeks ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated 11 months ago
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆23Jan 30, 2026Updated last month
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- Locate dlls and function addresses without PEB Walk and EAT parsing☆104Nov 7, 2025Updated 3 months ago
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆172Sep 3, 2025Updated 5 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- ☆20Apr 10, 2025Updated 10 months ago
- A variation of the IKE-SCAN user guide's transforms discovery script, adding a few features. Handshakes can be done in Main or Aggressive…☆13Jul 4, 2024Updated last year
- ☆17Jun 10, 2025Updated 8 months ago
- Repository for Ludus french templates☆21Updated this week