porterhau5 / BloodHoundView external linksLinks
Six Degrees of Domain Admin
☆15Oct 23, 2017Updated 8 years ago
Alternatives and similar repositories for BloodHound
Users that are interested in BloodHound are comparing it to the libraries listed below
Sorting:
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- ☆15Jan 9, 2026Updated last month
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- Bash Enumeration Script☆18Oct 18, 2019Updated 6 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆70Jul 26, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- A standalone addon for GnuPG☆18Nov 25, 2018Updated 7 years ago
- Small bash script for OpenVAS installation and management☆21Jun 10, 2019Updated 6 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 4 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- New and Improved☆17May 7, 2016Updated 9 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 6 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- Selenium based web scraper to generate passwords list☆51May 7, 2020Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- splunk_pentest_app☆50Apr 22, 2016Updated 9 years ago
- This Burp Suite extension allows you to customize header with put a new header into HTTP REQUEST BurpSuite (Scanner, Intruder, Repeater, …☆53Mar 29, 2023Updated 2 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- 504 VSAgent☆25Feb 21, 2018Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆59Mar 13, 2020Updated 5 years ago
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Sep 20, 2014Updated 11 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- 该脚本为Citrix XenMobile 目录遍历漏洞(CVE-2020-8209)批量检测脚本。☆31Dec 7, 2020Updated 5 years ago
- ☆27Oct 1, 2025Updated 4 months ago
- Collection of PowerShell network security scripts for system administrators.☆156Aug 31, 2019Updated 6 years ago
- ☆59May 1, 2019Updated 6 years ago
- Joomla Vulnerability Component Scanner☆62Sep 28, 2018Updated 7 years ago
- Office for Mac Macro Payload Generator☆244Sep 25, 2025Updated 4 months ago
- gpocheck☆30Aug 11, 2024Updated last year
- Adhoc scripts☆29Feb 12, 2017Updated 9 years ago