p0dalirius / ShareHoundLinks
A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily
☆120Updated this week
Alternatives and similar repositories for ShareHound
Users that are interested in ShareHound are comparing it to the libraries listed below
Sorting:
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆31Updated last month
- ☆114Updated 5 months ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆160Updated 3 months ago
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆145Updated 3 months ago
- Utilities for obfuscating shellcode☆94Updated last month
- Client-side Encrypted Upload Server Python Script☆64Updated 3 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆112Updated 3 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆86Updated last week
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆95Updated 2 months ago
- Python utility that generates "imageless" QR codes in various formats☆130Updated last year
- ☆160Updated 4 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 5 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆268Updated 4 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆197Updated last year
- pysnaffler☆104Updated 2 months ago
- Parses Snaffler output file and generate beautified outputs.☆108Updated 9 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆117Updated 9 months ago
- ☆148Updated 5 months ago
- Azure Post Exploitation Framework☆240Updated last month
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆166Updated 6 months ago
- A Python POC for CRED1 over SOCKS5☆158Updated last year
- The different ways to dump lsass☆193Updated 2 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆107Updated 7 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆98Updated last week
- Dump Kerberos tickets☆42Updated 2 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆124Updated 2 months ago
- Group Policy Objects manipulation and exploitation framework☆264Updated 3 weeks ago
- Generate and Manage KeyCredentialLinks☆174Updated 3 weeks ago
- sl0ppy-PrivescTaskCreator.ps1☆37Updated 3 weeks ago