A curated list of awesome BloodhoundAD resources
☆237Oct 13, 2022Updated 3 years ago
Alternatives and similar repositories for awesome-bloodhound
Users that are interested in awesome-bloodhound are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Jul 29, 2021Updated 4 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆331Oct 20, 2019Updated 6 years ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆492Feb 16, 2019Updated 7 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Dec 8, 2022Updated 3 years ago
- Building an Active Directory domain and hacking it☆667Dec 23, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆847Oct 29, 2025Updated 5 months ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Resources for our Active Directory security workshops☆140Sep 9, 2021Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- Port of Invoke-Excel4DCOM☆104Oct 12, 2019Updated 6 years ago
- ☆165Feb 13, 2020Updated 6 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆179Sep 11, 2023Updated 2 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆445Oct 19, 2022Updated 3 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆811Aug 28, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Active Directory Assessment and Privilege Escalation Script☆1,129Dec 7, 2022Updated 3 years ago
- C# Script used for Red Team☆722Nov 16, 2021Updated 4 years ago
- ☆350Feb 21, 2022Updated 4 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- My musings with C#☆28Dec 23, 2022Updated 3 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆244May 5, 2023Updated 2 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- ☆298Nov 9, 2020Updated 5 years ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆269Apr 4, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆354Dec 1, 2020Updated 5 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- dem sharp donuts☆203Sep 11, 2022Updated 3 years ago
- DAFT: Database Audit Framework & Toolkit☆182Aug 11, 2021Updated 4 years ago
- ☆18Feb 14, 2019Updated 7 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- Dump stuff without touching disk☆165Oct 29, 2020Updated 5 years ago
- Search tool to find specific files containing specific words, i.e. files containing passwords..☆752Nov 18, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A toolkit to attack Office365☆1,119Nov 6, 2020Updated 5 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆249Jun 19, 2024Updated last year
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆319Mar 31, 2021Updated 5 years ago
- ☆115Jul 18, 2019Updated 6 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- Abusing Exchange via EWS☆153Sep 14, 2020Updated 5 years ago
- ☆36Mar 11, 2019Updated 7 years ago