List of Bloodhound Python Custom Queries which I have found to be handy on engagements
☆17Sep 18, 2019Updated 6 years ago
Alternatives and similar repositories for BloodHoundCustomQueries
Users that are interested in BloodHoundCustomQueries are comparing it to the libraries listed below
Sorting:
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- ProcessHollowing via csharp☆13Dec 21, 2021Updated 4 years ago
- Entra ID Password Protection Banned Password Lists☆17Apr 16, 2024Updated last year
- DO NOT RUN THIS.☆10Jul 15, 2021Updated 4 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- C# wrapper for ligolo☆17Dec 9, 2021Updated 4 years ago
- Nmap NSE script for enumerate indices, plugins and cluster nodes on an elasticsearch target☆42Apr 17, 2021Updated 4 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆26Apr 3, 2022Updated 3 years ago
- Zoom Persistence Aggressor and Handler☆55Mar 24, 2021Updated 4 years ago
- ☆22Jul 29, 2021Updated 4 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆55Oct 1, 2020Updated 5 years ago
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 2 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- A repository with my code snippets for research/education purposes.☆53Jul 28, 2023Updated 2 years ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆30Nov 6, 2022Updated 3 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Feb 7, 2022Updated 4 years ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆33Jan 1, 2023Updated 3 years ago
- ☆31Sep 23, 2022Updated 3 years ago
- Implementation of SpoolSample without rDLL☆29Sep 28, 2020Updated 5 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- Finding SSL Blindspots for Red Teams☆34Jul 28, 2020Updated 5 years ago
- Some bash to make life easier after a new kali install..☆34Dec 11, 2022Updated 3 years ago
- ☆39Oct 12, 2022Updated 3 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Updated this week
- ☆10Sep 24, 2021Updated 4 years ago
- Scans for .NET Deserialization Bugs in .NET Assemblies☆81Nov 21, 2024Updated last year
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆47Jul 19, 2022Updated 3 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- Active Directory certificate abuse.☆38Feb 9, 2022Updated 4 years ago
- SMBExec implementation in Nim - SMBv2 using NTLM Authentication with Pass-The-Hash technique☆90Jul 19, 2022Updated 3 years ago