improsec / ImproHoundLinks
Identify the attack paths in BloodHound breaking your AD tiering
☆326Updated 3 years ago
Alternatives and similar repositories for ImproHound
Users that are interested in ImproHound are comparing it to the libraries listed below
Sorting:
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆235Updated 3 years ago
- ☆184Updated last year
- A tool for pointesters to find candies in SharePoint☆277Updated 3 years ago
- SpecterOps Presentations☆211Updated last week
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆194Updated 4 years ago
- Azure AD cheatsheet for the CARTP course☆143Updated 3 years ago
- GolenGMSA tool for working with GMSA passwords☆166Updated 5 months ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆256Updated 3 years ago
- Some scripts to abuse kerberos using Powershell☆355Updated 2 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258Updated 3 years ago
- ☆100Updated 5 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆399Updated 5 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Updated 3 weeks ago
- Material for the "Hands-On BloodHound" Workshop☆111Updated 4 years ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆146Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆482Updated last year
- Audit program for AzureAD☆150Updated 2 years ago
- Abusing Azure services over C2☆367Updated 2 weeks ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆223Updated 3 years ago
- ☆197Updated 5 months ago
- Get insights into the actual strength and quality of passwords in Active Directory.☆157Updated last year
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆233Updated 4 years ago
- ☆169Updated 2 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆190Updated 3 years ago
- ☆156Updated 2 years ago
- ☆198Updated last week
- ☆374Updated 2 years ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆156Updated last month
- PoSh BloodHound Dog Whisperer☆193Updated 2 years ago
- A Powershell module that helps you identify AppLocker weaknesses☆172Updated 5 years ago