☆18Sep 14, 2023Updated 2 years ago
Alternatives and similar repositories for split-bloodhound
Users that are interested in split-bloodhound are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- ☆15Oct 29, 2024Updated last year
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- A Python script to find tenant id an region from a list of domain names.☆18Jan 31, 2025Updated last year
- ☆13Mar 3, 2025Updated last year
- Azure Offensive Library☆17Oct 18, 2025Updated 5 months ago
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- Duplicate not owned Token from Running Process☆73Jul 21, 2023Updated 2 years ago
- SAM Dumping in C#☆54Nov 27, 2025Updated 3 months ago
- Async Python library to parse local and remote disk images.☆82Jul 11, 2025Updated 8 months ago
- ☆20Apr 21, 2020Updated 5 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 6 months ago
- VBA Macro obfuscator☆13Sep 20, 2020Updated 5 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆38Dec 7, 2025Updated 3 months ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 6 months ago
- ☆81Mar 11, 2026Updated last week
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- RDP Checker☆64Feb 23, 2024Updated 2 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 9 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 3 months ago
- Modified version of PEAS client for offensive operations☆16Mar 8, 2021Updated 5 years ago
- ☆11Aug 7, 2021Updated 4 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- ☆20Feb 6, 2024Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆26Aug 8, 2023Updated 2 years ago
- ☆145Oct 31, 2023Updated 2 years ago
- evilginx2 + gophish☆14Sep 8, 2022Updated 3 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago