SpecterOps / bloodhound-cliLinks
☆92Updated 2 months ago
Alternatives and similar repositories for bloodhound-cli
Users that are interested in bloodhound-cli are comparing it to the libraries listed below
Sorting:
- C2 Automation using Linode☆85Updated 3 years ago
- Living off the land searches for explorer and sharepoint☆90Updated 5 months ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆73Updated 6 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆132Updated 3 months ago
- ☆160Updated last year
- linikatz is a tool to attack AD on UNIX☆147Updated 2 years ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆76Updated last month
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆96Updated 2 years ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆139Updated last year
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆45Updated last year
- Automated exploitation of MSSQL servers at scale☆125Updated this week
- ☆114Updated 4 months ago
- Custom queries list for BloodHound☆30Updated 3 months ago
- Fast context enumeration for newly obtained Active Directory credentials.☆82Updated last month
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 5 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆154Updated 10 months ago
- PowerShell Reverse Shell☆79Updated 2 years ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆137Updated 2 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆125Updated 2 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆78Updated 11 months ago
- ☆21Updated 3 weeks ago
- 🌩️ Collection of BloodHound queries for Azure☆77Updated 9 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆88Updated 3 months ago
- ☆75Updated 8 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆255Updated last week
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆146Updated 2 years ago