improsec / ImproHoundLinks
Identify the attack paths in BloodHound breaking your AD tiering
☆320Updated 2 years ago
Alternatives and similar repositories for ImproHound
Users that are interested in ImproHound are comparing it to the libraries listed below
Sorting:
- GolenGMSA tool for working with GMSA passwords☆150Updated last year
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆233Updated 2 years ago
- ☆178Updated 6 months ago
- Azure AD cheatsheet for the CARTP course☆116Updated 3 years ago
- A tool for pointesters to find candies in SharePoint☆257Updated 2 years ago
- Get insights into the actual strength and quality of passwords in Active Directory.☆154Updated 10 months ago
- SpecterOps Presentations☆198Updated 3 weeks ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆94Updated last year
- Material for the "Hands-On BloodHound" Workshop☆108Updated 4 years ago
- Audit program for AzureAD☆148Updated 2 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆188Updated 3 years ago
- ☆247Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆336Updated last year
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆220Updated 4 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆112Updated 11 months ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆255Updated 3 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆175Updated 2 years ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆164Updated 8 months ago
- ☆159Updated 6 months ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆331Updated 2 weeks ago
- ☆151Updated 3 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆224Updated 4 months ago
- Abusing Azure services over C2☆338Updated last week
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆173Updated 9 months ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆389Updated last year
- Monitor your PingCastle scans to highlight the rule diff between two scans☆111Updated 9 months ago
- Some scripts to abuse kerberos using Powershell☆340Updated last year
- ☆164Updated last year
- Active Directory delegation management tool☆299Updated last year
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆70Updated 5 months ago