kypvas / LDIFToBloodHoundView external linksLinks
A Windows tool that converts LDIF files to BloodHound CE
☆25Dec 20, 2025Updated last month
Alternatives and similar repositories for LDIFToBloodHound
Users that are interested in LDIFToBloodHound are comparing it to the libraries listed below
Sorting:
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 3 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 2 months ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆56Dec 4, 2025Updated 2 months ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- rust port of pspy with support for process monitoring over dbus☆35Jan 4, 2026Updated last month
- shellcode transformation tool for YARA evasion☆50Dec 17, 2025Updated last month
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Oct 20, 2025Updated 3 months ago
- Proof of concept for Kerberos Armoring abuse.☆78Dec 12, 2025Updated 2 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆33Aug 18, 2025Updated 5 months ago
- ☆59Dec 10, 2025Updated 2 months ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆90Dec 28, 2025Updated last month
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Nov 27, 2025Updated 2 months ago
- Fast Windows post-exploitation wins after initial access.☆28Jan 28, 2026Updated 2 weeks ago
- WMI Explorer☆76Jan 5, 2026Updated last month
- A C# tool for extracting information from SCCM PXE boot media.☆45Jan 14, 2026Updated 3 weeks ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated last month
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆60Jan 5, 2026Updated last month
- A Payload Analysis Framework☆116Oct 9, 2025Updated 4 months ago
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆48Nov 2, 2025Updated 3 months ago
- Calling the undocumented DPAPI RPC interface directly, no more calling public CryptUnprotectData!☆66Feb 4, 2026Updated last week
- ☆26Aug 5, 2025Updated 6 months ago
- This C# tool sprays for admin access over the entire domain☆87Dec 7, 2025Updated 2 months ago
- Slides and resources from MCTTP 2025 Talk☆66Oct 26, 2025Updated 3 months ago
- Linker for Beacon Object Files☆149Updated this week
- adws enumeration bof☆162Oct 2, 2025Updated 4 months ago
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆79Apr 2, 2025Updated 10 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆164Oct 21, 2025Updated 3 months ago
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- 🛠️ Explore custom C2 TTPs with Aether-C2-Framework, focusing on lightweight Rust implants and stealthy transport stacks to reduce forens…☆18Updated this week
- Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.☆207Jan 6, 2026Updated last month
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆94Jul 3, 2025Updated 7 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆167Nov 17, 2025Updated 2 months ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Exhaustive search and flexible filtering of Active Directory ACEs.☆73Nov 10, 2025Updated 3 months ago
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated 9 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆98Jan 25, 2026Updated 2 weeks ago
- A lightweight Windows Prefetch file parser to extract programs' execution history☆63Jan 12, 2026Updated last month