p0dalirius / ShareHoundView external linksLinks
A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily
☆260Feb 5, 2026Updated last week
Alternatives and similar repositories for ShareHound
Users that are interested in ShareHound are comparing it to the libraries listed below
Sorting:
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 3 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 2 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆291Updated this week
- ☆378Oct 17, 2025Updated 3 months ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆354Jan 8, 2026Updated last month
- A Windows tool that converts LDIF files to BloodHound CE☆25Dec 20, 2025Updated last month
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 7 months ago
- ☆20Sep 6, 2025Updated 5 months ago
- A BloodHound collector for Microsoft Configuration Manager☆363Jul 7, 2025Updated 7 months ago
- A small How-To on creating your own weaponized WSL file☆119Jul 23, 2025Updated 6 months ago
- RPC to WebClient startup☆55Aug 19, 2025Updated 5 months ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆94Jul 3, 2025Updated 7 months ago
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆855Feb 3, 2024Updated 2 years ago
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated 9 months ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆113Dec 21, 2025Updated last month
- Random BOFs for LDAP tradecraft☆72Sep 9, 2025Updated 5 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.☆564Oct 27, 2025Updated 3 months ago
- Simple BOF to read the protection level of a process☆118May 10, 2023Updated 2 years ago
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆328Jan 14, 2026Updated last month
- Automating the MITM attack on WSUS☆306Jan 4, 2026Updated last month
- Shellcode injection using the Windows Debugging API☆165Jan 4, 2026Updated last month
- DPAPI looting remotely and locally in Python☆540Oct 7, 2025Updated 4 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆386Feb 23, 2024Updated last year
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆68Feb 6, 2026Updated last week
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 3 months ago
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆57Jul 2, 2025Updated 7 months ago
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆144Aug 19, 2025Updated 5 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆164Oct 21, 2025Updated 3 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆635May 8, 2025Updated 9 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆655Jan 16, 2026Updated 3 weeks ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- Hybrid AD utilities for ROADtools☆106May 25, 2025Updated 8 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆163Nov 2, 2025Updated 3 months ago
- ☆51Jun 28, 2025Updated 7 months ago
- Group Policy Objects manipulation and exploitation framework☆289Dec 7, 2025Updated 2 months ago
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆171May 13, 2024Updated last year