idnahacks / GoodHoundLinks
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
☆469Updated last year
Alternatives and similar repositories for GoodHound
Users that are interested in GoodHound are comparing it to the libraries listed below
Sorting:
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Updated 2 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆358Updated 2 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆492Updated 2 years ago
- BloodHound Attack Research Kit☆553Updated 5 months ago
- Identify the attack paths in BloodHound breaking your AD tiering☆322Updated 2 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆220Updated 3 years ago
- Azure JWT Token Manipulation Toolset☆679Updated 8 months ago
- MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).☆406Updated 10 months ago
- Infrastructure Automation☆352Updated last year
- A PowerShell armoury for security guys and girls☆473Updated last year
- Your template-based BloodHound terminal companion tool☆415Updated last week
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆235Updated 3 years ago
- An active directory laboratory for penetration testing.☆137Updated 4 years ago
- A C# utility for interacting with SCCM☆648Updated 11 months ago
- Deploy customizable Active Directory labs in Azure - automatically.☆426Updated 8 months ago
- Course repository for PowerShell for Pentesters Course☆432Updated 3 years ago
- BadZure orchestrates the setup of Azure AD tenants, populating them with diverse entities while also introducing common security misconfi…☆465Updated last month
- Python script that performs email address validation against Office 365 without submitting login attempts.☆359Updated 5 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated 4 months ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆829Updated 4 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆816Updated 2 weeks ago
- Some scripts to abuse kerberos using Powershell☆342Updated 2 years ago
- ☆404Updated 2 months ago
- ☆122Updated last year
- SMBeagle - Fileshare auditing tool.☆722Updated 7 months ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆397Updated 5 months ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆386Updated last year
- Get insights into the actual strength and quality of passwords in Active Directory.☆155Updated last year
- Active Directory delegation management tool☆318Updated 2 years ago
- A centralized resource for previously documented WDAC bypass techniques☆573Updated 3 months ago