improsec / ImproHoundLinks
Identify the attack paths in BloodHound breaking your AD tiering
☆322Updated 2 years ago
Alternatives and similar repositories for ImproHound
Users that are interested in ImproHound are comparing it to the libraries listed below
Sorting:
- A tool for pointesters to find candies in SharePoint☆259Updated 2 years ago
- ☆179Updated 7 months ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆236Updated 3 years ago
- SpecterOps Presentations☆203Updated 2 weeks ago
- Azure AD cheatsheet for the CARTP course☆122Updated 3 years ago
- GolenGMSA tool for working with GMSA passwords☆152Updated 3 weeks ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆258Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257Updated 3 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆188Updated 4 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆113Updated last year
- Some scripts to abuse kerberos using Powershell☆343Updated last year
- Abusing Azure services over C2☆345Updated last month
- ☆164Updated last year
- Get insights into the actual strength and quality of passwords in Active Directory.☆155Updated last year
- Material for the "Hands-On BloodHound" Workshop☆109Updated 4 years ago
- Collection of scripts to retrieve stored passwords from Veeam Backup☆132Updated last month
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆393Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆175Updated 2 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆95Updated last year
- ☆146Updated 3 months ago
- ☆190Updated 2 years ago
- ☆249Updated last year
- ☆151Updated 5 months ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆469Updated last year
- A tool to query for the existence of pre-windows 2000 computer objects.☆338Updated last month
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆164Updated last week
- ☆92Updated 4 years ago
- ☆161Updated 8 months ago
- Active Directory delegation management tool☆313Updated 2 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆375Updated last year