byt3bl33d3r / BloodHound-ToolsView external linksLinks
Miscellaneous tools for BloodHound
☆19Jan 26, 2022Updated 4 years ago
Alternatives and similar repositories for BloodHound-Tools
Users that are interested in BloodHound-Tools are comparing it to the libraries listed below
Sorting:
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 5 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆33Mar 2, 2021Updated 4 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Jul 2, 2021Updated 4 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- LDAP library for auditing MS AD☆13Nov 28, 2023Updated 2 years ago
- This tool helps you to hack android device front camera☆18Sep 27, 2023Updated 2 years ago
- The best tool to check the list of phone numbers for cut which have Telegram accounts☆11Oct 14, 2025Updated 4 months ago
- Software exploitation training material☆16Jun 8, 2017Updated 8 years ago
- Phishing Campaign Toolkit☆13Nov 9, 2021Updated 4 years ago
- Notes on offensive training☆16Nov 29, 2017Updated 8 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆14Dec 24, 2019Updated 6 years ago
- All xxx-arsenal repos in one☆17Jan 28, 2019Updated 7 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Jan 20, 2020Updated 6 years ago
- Damn Small SQLi Scanner. (DSSS)☆15Nov 25, 2017Updated 8 years ago
- CEH V12 Training Kit (20 Modules)☆17Nov 15, 2024Updated last year
- A collection of awesome readme templates to display on your profile☆20Jul 25, 2020Updated 5 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Aug 13, 2022Updated 3 years ago
- Send bulk report spam/copyright/pornography/scam/... to your destination Telegram channel to get scam tag by Telegram or take it down by …☆18Oct 14, 2025Updated 4 months ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- A host-based IDS and network monitoring system (My graduation project)☆25Jul 6, 2021Updated 4 years ago
- Tools and scripts for penetration testing☆19Jun 28, 2020Updated 5 years ago
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆23Nov 22, 2019Updated 6 years ago
- Dump Windows PE file information in C☆24May 2, 2015Updated 10 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- Aircraft detection in satellite images using computer vision and machine learning.☆13Jul 30, 2024Updated last year
- #!/usr/bin/python3 #-*-coding:utf-8-*- # Made With ❤️ By Ahmar And AHMARCODE Project # Update V0.1 # Copyright© Ahmar ID 2021 # 100% Ope…☆12Dec 11, 2021Updated 4 years ago
- Fuxsociety Mr Robot 2.1☆28May 15, 2023Updated 2 years ago
- Collection of our CTF write-ups☆28Aug 7, 2020Updated 5 years ago
- Track Bluetooth devices and their proximity to a GPS location.☆23Apr 29, 2023Updated 2 years ago
- A swiss army knife for pentesting networks☆26Sep 3, 2022Updated 3 years ago
- Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)☆65Dec 16, 2020Updated 5 years ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- This tool allows you to get the approximate location of a Bluetooth device using the long-awaited: Wigle.net API.☆36Mar 3, 2023Updated 2 years ago
- Modern problems require modern solutions☆32Nov 22, 2022Updated 3 years ago