Six Degrees of Domain Admin
☆15Oct 23, 2017Updated 8 years ago
Alternatives and similar repositories for BloodHound
Users that are interested in BloodHound are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- Small bash script for OpenVAS installation and management☆21Jun 10, 2019Updated 6 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- New and Improved☆17May 7, 2016Updated 9 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Bash Enumeration Script☆18Oct 18, 2019Updated 6 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 8 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- This is the gandcrab v5.0.3 javascript dropper☆11Apr 29, 2020Updated 5 years ago
- Exécutable permettant de lancer l’application (front office) PIA sur son ordinateur. C’est une version portable de l’outil PIA. | Executa…☆11Aug 2, 2021Updated 4 years ago
- splunk_pentest_app☆50Apr 22, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆15Jan 9, 2026Updated 3 months ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆87Apr 21, 2017Updated 8 years ago
- Nmap Web Dashboard and Reporting☆34May 1, 2022Updated 3 years ago
- Java Web shell project☆12Oct 22, 2021Updated 4 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Mach-O file format reader, written entirely in Swift☆13May 10, 2020Updated 5 years ago
- ☆18Jun 14, 2023Updated 2 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆45Sep 29, 2015Updated 10 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- Selenium based web scraper to generate passwords list☆51May 7, 2020Updated 5 years ago
- Presentations☆10Oct 2, 2017Updated 8 years ago
- Black Hat 2017 - Wi-Fi Direct to Hell☆13Dec 6, 2017Updated 8 years ago
- PowerShell module for Cisco Firepower Management Center (FMC)☆12Sep 17, 2019Updated 6 years ago
- Active Directory enumeration from non-domain system.☆118Dec 15, 2016Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- This is a compilation of functions to simplify scripts to manage AD tasks☆10Apr 7, 2016Updated 10 years ago
- Collection of PowerShell network security scripts for system administrators.☆156Aug 31, 2019Updated 6 years ago
- A subdomain reconnaissance scanner☆36Dec 8, 2022Updated 3 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago