improsec / ImproHoundLinks
Identify the attack paths in BloodHound breaking your AD tiering
☆322Updated 3 years ago
Alternatives and similar repositories for ImproHound
Users that are interested in ImproHound are comparing it to the libraries listed below
Sorting:
- A tool for pointesters to find candies in SharePoint☆271Updated 3 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆237Updated 3 years ago
- ☆182Updated last year
- Azure AD cheatsheet for the CARTP course☆137Updated 3 years ago
- GolenGMSA tool for working with GMSA passwords☆163Updated 3 months ago
- SpecterOps Presentations☆209Updated this week
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆194Updated 4 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆115Updated last year
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258Updated 3 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆97Updated last month
- ☆167Updated 2 years ago
- Material for the "Hands-On BloodHound" Workshop☆111Updated 4 years ago
- Get insights into the actual strength and quality of passwords in Active Directory.☆156Updated last year
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆258Updated 3 years ago
- ☆191Updated 2 years ago
- Some scripts to abuse kerberos using Powershell☆350Updated 2 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆478Updated last year
- ☆407Updated 6 months ago
- ☆97Updated 5 years ago
- ☆153Updated 8 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆189Updated 2 years ago
- ☆153Updated last year
- ☆196Updated 3 months ago
- Collection of cyphers for bloodhound☆155Updated last year
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆398Updated 3 months ago
- ☆368Updated 2 years ago
- Custom Queries - Brought Up to BH4.1 syntax☆268Updated 2 months ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆180Updated 7 months ago
- ☆158Updated 9 months ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆153Updated last month