A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily
☆270Feb 5, 2026Updated last month
Alternatives and similar repositories for ShareHound
Users that are interested in ShareHound are comparing it to the libraries listed below
Sorting:
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 4 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- ☆381Oct 17, 2025Updated 4 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆292Feb 10, 2026Updated 3 weeks ago
- A BloodHound collector for Microsoft Configuration Manager☆392Jul 7, 2025Updated 8 months ago
- Automating the MITM attack on WSUS☆309Feb 24, 2026Updated last week
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆862Feb 3, 2024Updated 2 years ago
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆58Jul 2, 2025Updated 8 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆75Feb 27, 2026Updated last week
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆358Jan 8, 2026Updated last month
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 4 months ago
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 8 months ago
- ☆20Sep 6, 2025Updated 6 months ago
- A small How-To on creating your own weaponized WSL file☆122Jul 23, 2025Updated 7 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆27Dec 20, 2025Updated 2 months ago
- RPC to WebClient startup☆55Aug 19, 2025Updated 6 months ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- DPAPI looting remotely and locally in Python☆542Oct 7, 2025Updated 5 months ago
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated 10 months ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆116Dec 21, 2025Updated 2 months ago
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 5 months ago
- Python tool to automatically perform SPN-less RBCD attacks.☆123Jan 7, 2026Updated last month
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆656Jan 16, 2026Updated last month
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- Simple BOF to read the protection level of a process☆118May 10, 2023Updated 2 years ago
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆334Jan 14, 2026Updated last month
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆637May 8, 2025Updated 9 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆892Updated this week
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆386Feb 23, 2024Updated 2 years ago
- Shellcode injection using the Windows Debugging API☆171Jan 4, 2026Updated 2 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆155Jan 3, 2026Updated 2 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.☆628Oct 27, 2025Updated 4 months ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆58Dec 15, 2025Updated 2 months ago
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆145Feb 16, 2026Updated 2 weeks ago
- Hybrid AD utilities for ROADtools☆108May 25, 2025Updated 9 months ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago