layer8secure / ConvertHound
An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by Layer 8.
☆14Updated 3 years ago
Related projects: ⓘ
- Ansible role that Installs Mythic☆14Updated 2 months ago
- ☆17Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆19Updated 5 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆28Updated last year
- ☆18Updated 4 years ago
- Modified version of PEAS client for offensive operations☆38Updated last year
- ☆20Updated this week
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆37Updated 2 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Discord C2 Profile for Mythic☆23Updated 5 months ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆19Updated 3 years ago
- A multithreaded, queued SSH key and/or password spraying tool.☆15Updated last year
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆10Updated 3 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆17Updated 5 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- A fast wordlist to nthash converter☆21Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Scripts to interact with Microsoft Graph APIs☆29Updated 2 months ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆16Updated 3 years ago
- ☆22Updated 3 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- ☆30Updated 4 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- My BloodHound custom queries☆22Updated last year
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago