improsec / ImproHound
Identify the attack paths in BloodHound breaking your AD tiering
☆316Updated 2 years ago
Alternatives and similar repositories for ImproHound:
Users that are interested in ImproHound are comparing it to the libraries listed below
- A tool for pointesters to find candies in SharePoint☆250Updated 2 years ago
- GolenGMSA tool for working with GMSA passwords☆139Updated 11 months ago
- Material for the "Hands-On BloodHound" Workshop☆108Updated 3 years ago
- ☆176Updated 3 months ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆230Updated 2 years ago
- ☆245Updated last year
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆182Updated 3 years ago
- Azure AD cheatsheet for the CARTP course☆108Updated 2 years ago
- ☆147Updated last month
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆320Updated last year
- SpecterOps Presentations☆185Updated 3 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆171Updated 2 years ago
- Python based BloodHound data importer☆146Updated last year
- ☆157Updated 4 months ago
- Some scripts to abuse kerberos using Powershell☆328Updated last year
- Get insights into the actual strength and quality of passwords in Active Directory.☆154Updated 8 months ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆228Updated last year
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆161Updated 5 months ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆351Updated 9 months ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆145Updated 4 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆378Updated 2 years ago
- Audit program for AzureAD☆146Updated last year
- A Powershell module that helps you identify AppLocker weaknesses☆165Updated 5 years ago
- Abusing Intune for Lateral Movement over C2☆327Updated last month
- A C# utility for interacting with SCCM☆610Updated 5 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆214Updated last month
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆215Updated 4 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆110Updated 9 months ago
- ☆206Updated 3 years ago