BloodHound Docker Ready to Use
☆90Jun 8, 2023Updated 2 years ago
Alternatives and similar repositories for docker-bloodhound
Users that are interested in docker-bloodhound are comparing it to the libraries listed below
Sorting:
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Feb 5, 2021Updated 5 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆484Jul 9, 2024Updated last year
- Maximizing BloodHound. Max is a good boy.☆532Apr 25, 2025Updated 10 months ago
- Copy cat model for Proofpoint☆91Apr 30, 2020Updated 5 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- A Python based ingestor for BloodHound☆2,359Oct 24, 2025Updated 4 months ago
- quASAR: ASAR manipulation made easy☆38Sep 7, 2022Updated 3 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Some scripts to abuse kerberos using Powershell☆355Jul 27, 2023Updated 2 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆32Aug 16, 2023Updated 2 years ago
- Notes I made while preparing for the CRTP certification exam☆13Jul 1, 2021Updated 4 years ago
- ☆120Mar 28, 2025Updated 11 months ago
- Python based BloodHound data importer☆150Jul 5, 2023Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆530Nov 19, 2024Updated last year
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆17Jul 27, 2024Updated last year
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,553Mar 11, 2026Updated last week
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆275Jan 13, 2022Updated 4 years ago
- Tools for Kerberos PKINIT and relaying to AD CS☆887Jan 3, 2025Updated last year
- ☆36Oct 16, 2023Updated 2 years ago
- Tool written in Rust to perform Password Spraying attacks against Azure/Office 365 accounts☆18Feb 22, 2024Updated 2 years ago
- ☆429Apr 22, 2025Updated 10 months ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 2 years ago
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆672Oct 23, 2025Updated 4 months ago
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆84Mar 29, 2023Updated 2 years ago
- RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a gi…☆17Jun 7, 2024Updated last year
- ADCS abuser☆317Feb 6, 2023Updated 3 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 3 years ago
- Takes the original idea of NetCease and adds functionality☆24Feb 6, 2022Updated 4 years ago
- ☆242Nov 21, 2024Updated last year
- C# Port of LdapRelayScan☆91Nov 26, 2025Updated 3 months ago
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated 11 months ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,135Oct 21, 2024Updated last year
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆42Updated this week