cogiceo / GPOHoundView external linksLinks
Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data
☆354Jan 8, 2026Updated last month
Alternatives and similar repositories for GPOHound
Users that are interested in GPOHound are comparing it to the libraries listed below
Sorting:
- A BloodHound collector for Microsoft Configuration Manager☆364Jul 7, 2025Updated 7 months ago
- ☆235Oct 8, 2024Updated last year
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆886Updated this week
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆381Dec 13, 2024Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆635May 8, 2025Updated 9 months ago
- Enumerate Domain Users Without Authentication☆281Apr 22, 2025Updated 9 months ago
- Just another Powerview alternative but on steroids☆863Jan 5, 2026Updated last month
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆273Dec 27, 2024Updated last year
- Windows remote execution multitool☆780Oct 1, 2025Updated 4 months ago
- Tool for viewing NTDS.dit☆191Mar 14, 2025Updated 11 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆855Feb 3, 2024Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆359Jan 29, 2026Updated 2 weeks ago
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆328Jan 14, 2026Updated last month
- ☆198Mar 28, 2025Updated 10 months ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆384Sep 26, 2025Updated 4 months ago
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆447Jan 15, 2026Updated last month
- Abusing Azure services over C2☆368Jan 20, 2026Updated 3 weeks ago
- ☆159May 5, 2025Updated 9 months ago
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆418Sep 29, 2025Updated 4 months ago
- Generate and Manage KeyCredentialLinks☆241Jan 30, 2026Updated 2 weeks ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆287Apr 29, 2025Updated 9 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆534May 9, 2025Updated 9 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆358Dec 13, 2025Updated 2 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 7 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆291Updated this week
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- ☆137Feb 11, 2025Updated last year
- BOF with Synthetic Stackframe☆220Oct 30, 2025Updated 3 months ago
- DPAPI looting remotely and locally in Python☆540Oct 7, 2025Updated 4 months ago
- ForsHops☆152Mar 25, 2025Updated 10 months ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆433Jun 27, 2025Updated 7 months ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆585Mar 19, 2024Updated last year
- ACL Viewer for Windows☆132May 4, 2025Updated 9 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆260Feb 21, 2025Updated 11 months ago
- A C# utility for interacting with SCCM☆682Aug 20, 2025Updated 5 months ago
- Ask a TGS on behalf of another user without password☆481Mar 30, 2025Updated 10 months ago
- Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive an…☆1,086Feb 4, 2026Updated last week
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago