SpecterOps / bloodhound-cliLinks
☆71Updated last week
Alternatives and similar repositories for bloodhound-cli
Users that are interested in bloodhound-cli are comparing it to the libraries listed below
Sorting:
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆40Updated last year
- Custom queries list for BloodHound☆29Updated this week
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆68Updated 3 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- C2 Automation using Linode☆82Updated 2 years ago
- Scripts that automate portions of pentests.☆51Updated 2 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆85Updated this week
- Living off the land searches for explorer and sharepoint☆87Updated 2 months ago
- Automated exploitation of MSSQL servers at scale☆109Updated 3 weeks ago
- PowerShell Reverse Shell☆78Updated 2 years ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆77Updated 7 months ago
- ☆109Updated 8 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆117Updated last month
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆36Updated last year
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆44Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 10 months ago
- Your Skyfall Infrastructure Pack☆76Updated last month
- ☆159Updated last year
- Deploy a phishing infrastructure on the fly.☆71Updated 6 months ago
- ☆16Updated this week
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆77Updated last week
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Updated 4 years ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆58Updated last month
- Red Team Collaboration Infrastructure☆93Updated 2 months ago
- ☆63Updated 5 months ago
- 🌩️ Collection of BloodHound queries for Azure☆74Updated 6 months ago
- Python alternative to Mimikatz lsadump::dcshadow