Six Degrees of Domain Admin
☆15Oct 23, 2017Updated 8 years ago
Alternatives and similar repositories for BloodHound
Users that are interested in BloodHound are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- Small bash script for OpenVAS installation and management☆21Jun 10, 2019Updated 6 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- New and Improved☆17May 7, 2016Updated 10 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Bash Enumeration Script☆18Oct 18, 2019Updated 6 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Automate SSH communication with firewalls, switches, etc.☆28Mar 29, 2018Updated 8 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- splunk_pentest_app☆50Apr 22, 2016Updated 10 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆87Apr 21, 2017Updated 9 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- Netwitness Maltego integration Project☆18May 9, 2017Updated 9 years ago
- DumpStrings programmatically extracts strings from Mach-O (macOS), ELF (Linux), and PE (Windows) binary formats by parsing their string-c…☆17Mar 14, 2026Updated last month
- Exfiltrate files over dns requests using Python and/or Bash☆45Sep 29, 2015Updated 10 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Presentations☆10Oct 2, 2017Updated 8 years ago
- Black Hat 2017 - Wi-Fi Direct to Hell☆13Dec 6, 2017Updated 8 years ago
- PowerShell module for Cisco Firepower Management Center (FMC)☆12Sep 17, 2019Updated 6 years ago
- Active Directory enumeration from non-domain system.☆118Dec 15, 2016Updated 9 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- This is a compilation of functions to simplify scripts to manage AD tasks☆10Apr 7, 2016Updated 10 years ago
- Collection of PowerShell network security scripts for system administrators.☆156Aug 31, 2019Updated 6 years ago
- A subdomain reconnaissance scanner☆36Dec 8, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- API public documentation☆10Dec 17, 2018Updated 7 years ago
- Cybersecurity - a python3 script to parse and analyze .msg and .eml email files☆14Jan 8, 2020Updated 6 years ago
- ☆22Oct 22, 2019Updated 6 years ago
- Script to generate an html reports of installed software, installed updates and installed components on a remote computer☆11Mar 13, 2025Updated last year
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Oct 21, 2018Updated 7 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago