Six Degrees of Domain Admin
☆15Oct 23, 2017Updated 8 years ago
Alternatives and similar repositories for BloodHound
Users that are interested in BloodHound are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- Small bash script for OpenVAS installation and management☆21Jun 10, 2019Updated 6 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- New and Improved☆17May 7, 2016Updated 9 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Bash Enumeration Script☆18Oct 18, 2019Updated 6 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 8 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- This is the gandcrab v5.0.3 javascript dropper☆10Apr 29, 2020Updated 5 years ago
- Exécutable permettant de lancer l’application (front office) PIA sur son ordinateur. C’est une version portable de l’outil PIA. | Executa…☆11Aug 2, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- splunk_pentest_app☆50Apr 22, 2016Updated 9 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago
- Java Web shell project☆12Oct 22, 2021Updated 4 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- Mach-O file format reader, written entirely in Swift☆13May 10, 2020Updated 5 years ago
- DumpStrings programmatically extracts strings from Mach-O (macOS), ELF (Linux), and PE (Windows) binary formats by parsing their string-c…☆17Mar 14, 2026Updated 2 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Netwitness Maltego integration Project☆18May 9, 2017Updated 8 years ago
- ☆18Jun 14, 2023Updated 2 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆45Sep 29, 2015Updated 10 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- Presentations☆10Oct 2, 2017Updated 8 years ago
- Selenium based web scraper to generate passwords list☆51May 7, 2020Updated 5 years ago
- Black Hat 2017 - Wi-Fi Direct to Hell☆13Dec 6, 2017Updated 8 years ago
- PowerShell module for Cisco Firepower Management Center (FMC)☆12Sep 17, 2019Updated 6 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- This is a compilation of functions to simplify scripts to manage AD tasks☆10Apr 7, 2016Updated 9 years ago
- A subdomain reconnaissance scanner☆36Dec 8, 2022Updated 3 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- API public documentation☆10Dec 17, 2018Updated 7 years ago
- Cybersecurity - a python3 script to parse and analyze .msg and .eml email files☆14Jan 8, 2020Updated 6 years ago