SpecterOps / MSSQLHoundLinks
PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph
☆107Updated this week
Alternatives and similar repositories for MSSQLHound
Users that are interested in MSSQLHound are comparing it to the libraries listed below
Sorting:
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆123Updated 4 months ago
- ☆140Updated 2 months ago
- ☆188Updated 4 months ago
- A Python POC for CRED1 over SOCKS5☆151Updated 9 months ago
- ☆89Updated 6 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆115Updated 2 weeks ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆203Updated 9 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆159Updated last month
- Active Directory Authentication Library☆78Updated 2 weeks ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆106Updated 3 weeks ago
- Adversary Emulation Framework☆121Updated last month
- Enumerate Domain Users Without Authentication☆253Updated 3 months ago
- ☆220Updated 9 months ago
- Build sneaky & malicious LNK files.☆94Updated 2 weeks ago
- Local SYSTEM auth trigger for relaying☆129Updated last week
- ☆83Updated last year
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆147Updated 5 months ago
- ☆207Updated last year
- Advanced In-Memory PowerShell Process Injection Framework☆67Updated 2 weeks ago
- ☆159Updated last year
- ☆56Updated 5 months ago
- ☆65Updated 2 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆85Updated last week
- ☆67Updated 6 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 6 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆77Updated last month
- Lateral Movement☆124Updated last year
- Inject RDPThief into memory with PowerShell.☆65Updated 6 months ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆297Updated last month