Tanguy-Boisset / bloodhound-automation
Automatically run and populate a new instance of BH CE
☆54Updated last month
Related projects ⓘ
Alternatives and complementary repositories for bloodhound-automation
- Hybrid AD utilities for ROADtools☆63Updated this week
- ☆64Updated this week
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆165Updated 3 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆129Updated 2 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆147Updated 3 weeks ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆157Updated 3 weeks ago
- ☆173Updated 9 months ago
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆117Updated 6 months ago
- Assess the security of your Active Directory with few or all privileges.☆186Updated this week
- ☆187Updated last month
- ☆129Updated last month
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆70Updated this week
- Disconnected GPO Editor - A Group Policy Manager launcher to allow editing of domain GPOs from non-domain joined machines☆152Updated 2 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆79Updated 4 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆88Updated 3 weeks ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆30Updated 6 months ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆152Updated 2 months ago
- ☆34Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆134Updated 3 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆78Updated 2 months ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆79Updated last year
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆104Updated last month
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆164Updated last month
- ☆112Updated last year
- ☆127Updated 3 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆158Updated 5 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆94Updated 5 months ago
- pysnaffler☆86Updated 3 months ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆119Updated 3 years ago