p4p1 / havoc-bloodhoundView external linksLinks
A GUI wrapper inside of Havoc to interact with bloodhound CE
☆70Feb 3, 2024Updated 2 years ago
Alternatives and similar repositories for havoc-bloodhound
Users that are interested in havoc-bloodhound are comparing it to the libraries listed below
Sorting:
- ☆11Dec 8, 2023Updated 2 years ago
- ☆89Jan 2, 2024Updated 2 years ago
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 2 years ago
- A C# port from Invoke-GhostTask☆119Jan 5, 2024Updated 2 years ago
- Havoc plugin allowing in-memory execution of PowerShell cmdlets☆13Dec 14, 2023Updated 2 years ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆300Feb 2, 2026Updated 2 weeks ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆182Feb 2, 2026Updated 2 weeks ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Sep 13, 2024Updated last year
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- a port of privkit bof for havoc☆23Dec 8, 2023Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- Patching "signtool.exe" to accept expired certificates for code-signing.☆340Feb 2, 2026Updated 2 weeks ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆201Dec 27, 2023Updated 2 years ago
- ☆61Dec 15, 2023Updated 2 years ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆307Dec 9, 2023Updated 2 years ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆224Nov 23, 2023Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆12Jan 9, 2024Updated 2 years ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- To audit the security of read-only domain controllers☆118Nov 27, 2023Updated 2 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Aug 6, 2024Updated last year
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆318Feb 2, 2026Updated 2 weeks ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Sep 22, 2023Updated 2 years ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆132Nov 12, 2023Updated 2 years ago
- Linux Sleep Obfuscation☆107Jan 7, 2024Updated 2 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆137Feb 2, 2026Updated 2 weeks ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Shaco is a linux agent for havoc☆169Oct 25, 2023Updated 2 years ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆207Jan 12, 2025Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Jul 14, 2024Updated last year
- ☆35Dec 6, 2023Updated 2 years ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆39Nov 16, 2023Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆69Oct 6, 2023Updated 2 years ago