idnahacks / GoodHoundLinks
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
☆476Updated last year
Alternatives and similar repositories for GoodHound
Users that are interested in GoodHound are comparing it to the libraries listed below
Sorting:
- Collection of tools that reflect the network dimension into Bloodhound's data☆443Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆363Updated 4 months ago
- BloodHound Attack Research Kit☆558Updated 7 months ago
- Identify the attack paths in BloodHound breaking your AD tiering☆323Updated 3 years ago
- Azure JWT Token Manipulation Toolset☆694Updated 11 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆494Updated 2 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆222Updated 3 years ago
- MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).☆407Updated last year
- Your template-based BloodHound terminal companion tool☆433Updated 2 months ago
- Infrastructure Automation☆356Updated last year
- A PowerShell armoury for security guys and girls☆470Updated last year
- A C# utility for interacting with SCCM☆663Updated 2 months ago
- Python script that performs email address validation against Office 365 without submitting login attempts.☆369Updated 5 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆236Updated 3 years ago
- An active directory laboratory for penetration testing.☆143Updated 4 years ago
- SMBeagle - Fileshare auditing tool.☆733Updated last week
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆177Updated 4 months ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆405Updated 7 months ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆724Updated 3 months ago
- Active Directory delegation management tool☆368Updated 3 weeks ago
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆477Updated last week
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆858Updated 7 months ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆400Updated last year
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆844Updated last week
- Some scripts to abuse kerberos using Powershell☆345Updated 2 years ago
- ☆408Updated 5 months ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆824Updated 2 weeks ago
- A centralized resource for previously documented WDAC bypass techniques☆589Updated 2 months ago
- Deploy customizable Active Directory labs in Azure - automatically.☆428Updated 11 months ago
- Get insights into the actual strength and quality of passwords in Active Directory.☆157Updated last year