Opengraph-Compatible JSON Generator for BloodHound
☆27Jan 12, 2026Updated last month
Alternatives and similar repositories for ScrappyDoo
Users that are interested in ScrappyDoo are comparing it to the libraries listed below
Sorting:
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆68Feb 5, 2026Updated last month
- ☆18Jan 26, 2026Updated last month
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 7 months ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 7 months ago
- Rainbow table generation & lookup tools.☆32Dec 17, 2025Updated 2 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆95Feb 3, 2026Updated last month
- Scripts to enumerate and report on Entra Conditional Access☆41Sep 5, 2025Updated 6 months ago
- DRILL (Distributable Remote Integrated Lightweight Link) is a powerful and stealthy Command and Control (C2) framework designed for seaml…☆34Jul 31, 2025Updated 7 months ago
- Run TTPs, with AI!☆94Feb 23, 2026Updated 2 weeks ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆65Nov 14, 2025Updated 3 months ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- results of scraping OneDrive from February 2022 - March 2025☆27Apr 29, 2025Updated 10 months ago
- Identify Azure AD resources that issue tokens without MFA enforcement using the ROPC grant flow.☆83Feb 2, 2026Updated last month
- Dominate the domain. Relay to royalty.☆215Feb 17, 2026Updated 2 weeks ago
- ☆234Oct 8, 2024Updated last year
- RPC to WebClient startup☆55Aug 19, 2025Updated 6 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆168Jul 31, 2025Updated 7 months ago
- Mock STIX data demonstrating the new data source representation☆16Sep 13, 2023Updated 2 years ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 5 months ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆35Jan 18, 2026Updated last month
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last week
- Exploits Unauth Docker API☆43Apr 18, 2025Updated 10 months ago
- Automating the MITM attack on WSUS☆309Feb 24, 2026Updated 2 weeks ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆17Jan 22, 2026Updated last month
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 6 months ago
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 5 months ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 3 months ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- I want to say please and thank you to Claude, but I don't want to waste tokens on it.☆27Feb 18, 2026Updated 2 weeks ago
- ☆11Apr 15, 2021Updated 4 years ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 6 months ago
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆14Jan 4, 2026Updated 2 months ago
- ☆10Dec 28, 2015Updated 10 years ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 7 months ago