jazzpizazz / BloodHound.py-KerberosLinks
A Python based ingestor for BloodHound
☆84Updated 2 years ago
Alternatives and similar repositories for BloodHound.py-Kerberos
Users that are interested in BloodHound.py-Kerberos are comparing it to the libraries listed below
Sorting:
- ☆36Updated 3 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated last year
- Automated exploitation of MSSQL servers at scale☆112Updated this week
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- AV EVASION TECHNIQUES☆79Updated 3 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆123Updated 5 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆108Updated 3 years ago
- Buggy script to play with GPOs☆111Updated 7 months ago
- ☆123Updated last year
- CLI monitor for windows process- & file activity☆89Updated 4 years ago
- ☆118Updated 4 months ago
- ☆163Updated 8 months ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- ☆88Updated 5 years ago
- linikatz is a tool to attack AD on UNIX☆149Updated last year
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 6 months ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆104Updated 3 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- ☆67Updated 6 months ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆202Updated 2 months ago
- Cortex XDR Config Extractor☆132Updated 2 years ago
- ☆92Updated 4 years ago
- ☆73Updated this week
- PrintNightmare (CVE-2021-34527) PoC Exploit☆114Updated 2 years ago
- Custom queries list for BloodHound☆29Updated 3 weeks ago
- ☆21Updated 3 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- A collection of code snippets built to assist with breaking chains.☆119Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆86Updated 3 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago