Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph
☆75Feb 27, 2026Updated last week
Alternatives and similar repositories for AnsibleHound
Users that are interested in AnsibleHound are comparing it to the libraries listed below
Sorting:
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆58Jul 2, 2025Updated 8 months ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 7 months ago
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆270Feb 5, 2026Updated last month
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 6 months ago
- ☆38Jan 7, 2025Updated last year
- Tool for viewing NTDS.dit☆195Mar 14, 2025Updated 11 months ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆17Jan 22, 2026Updated last month
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆359Jan 8, 2026Updated 2 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 11 months ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- ☆13May 21, 2025Updated 9 months ago
- ☆43Jul 17, 2025Updated 7 months ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆45Aug 16, 2024Updated last year
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated last month
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆174Aug 13, 2025Updated 6 months ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 7 months ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 7 months ago
- Repository for tools used for the OSCP☆23Sep 18, 2025Updated 5 months ago
- ☆51Jun 28, 2025Updated 8 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆261Nov 22, 2025Updated 3 months ago
- A TUI for Active Directory collection.☆112Feb 17, 2026Updated 3 weeks ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆209Sep 30, 2024Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆638May 8, 2025Updated 10 months ago
- Enumerate Domain Users Without Authentication☆282Apr 22, 2025Updated 10 months ago
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.2☆69Feb 17, 2026Updated 3 weeks ago
- ☆142Sep 9, 2025Updated 6 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆119Jun 10, 2025Updated 9 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆502Oct 3, 2025Updated 5 months ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- plugx rat c2, supports TCP, UDP, HTTP☆14Sep 25, 2024Updated last year
- USRLINKS v1.0 - The Ultimate Username Reconnaissance Tool☆24Oct 6, 2025Updated 5 months ago
- ☆81Jan 26, 2025Updated last year
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- ☆17Feb 15, 2022Updated 4 years ago