idnahacks / GoodHoundLinks
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
☆481Updated last year
Alternatives and similar repositories for GoodHound
Users that are interested in GoodHound are comparing it to the libraries listed below
Sorting:
- Collection of tools that reflect the network dimension into Bloodhound's data☆445Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆367Updated 6 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆499Updated 2 years ago
- Azure JWT Token Manipulation Toolset☆707Updated last year
- Identify the attack paths in BloodHound breaking your AD tiering☆325Updated 3 years ago
- BloodHound Attack Research Kit☆576Updated 9 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆223Updated 3 years ago
- Infrastructure Automation☆359Updated last year
- MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).☆411Updated last year
- Your template-based BloodHound terminal companion tool☆445Updated 4 months ago
- A PowerShell armoury for security guys and girls☆468Updated last year
- An active directory laboratory for penetration testing.☆147Updated 5 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆236Updated 3 years ago
- A C# utility for interacting with SCCM☆678Updated 4 months ago
- SMBeagle - Fileshare auditing tool.☆741Updated 2 months ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆735Updated 5 months ago
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆480Updated last month
- Deploy customizable Active Directory labs in Azure - automatically.☆428Updated last year
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆175Updated 6 months ago
- ☆407Updated 7 months ago
- Some scripts to abuse kerberos using Powershell☆353Updated 2 years ago
- Python script that performs email address validation against Office 365 without submitting login attempts.☆373Updated 5 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆405Updated last year
- Course repository for PowerShell for Pentesters Course☆435Updated 3 years ago
- "Golden" certificates☆706Updated last year
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆874Updated 9 months ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆180Updated 9 months ago
- ☆412Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆865Updated last week
- ☆835Updated this week