improsec / ImproHound
Identify the attack paths in BloodHound breaking your AD tiering
☆319Updated 2 years ago
Alternatives and similar repositories for ImproHound:
Users that are interested in ImproHound are comparing it to the libraries listed below
- A tool for pointesters to find candies in SharePoint☆253Updated 2 years ago
- Azure AD cheatsheet for the CARTP course☆109Updated 2 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆232Updated 2 years ago
- Material for the "Hands-On BloodHound" Workshop☆107Updated 3 years ago
- GolenGMSA tool for working with GMSA passwords☆141Updated last year
- ☆178Updated 4 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆327Updated last year
- Get insights into the actual strength and quality of passwords in Active Directory.☆154Updated 9 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆219Updated 2 months ago
- ☆246Updated last year
- SpecterOps Presentations☆191Updated 2 weeks ago
- ☆150Updated 2 months ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆254Updated 2 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆110Updated 10 months ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆111Updated 8 months ago
- Audit program for AzureAD☆147Updated last year
- Some scripts to abuse kerberos using Powershell☆328Updated last year
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆164Updated 6 months ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆319Updated last month
- ☆142Updated 3 weeks ago
- Abusing Intune for Lateral Movement over C2☆332Updated 2 months ago
- ☆157Updated 5 months ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆185Updated 3 years ago
- ☆88Updated last week
- Python based BloodHound data importer☆146Updated last year
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated last week
- A Powershell module that helps you identify AppLocker weaknesses☆167Updated 5 years ago
- Modular Enumeration and Password Spraying Framework☆115Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆84Updated 2 years ago