Bring runZero Exposure Management into BloodHound
☆44Nov 19, 2025Updated 3 months ago
Alternatives and similar repositories for runZeroHound
Users that are interested in runZeroHound are comparing it to the libraries listed below
Sorting:
- ☆20Sep 6, 2025Updated 5 months ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 7 months ago
- AppLocker Policy Generator☆25Aug 25, 2025Updated 6 months ago
- Tiny and fast port scanner (Sliver edition)☆27Feb 17, 2026Updated last week
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆119Jun 10, 2025Updated 8 months ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆63Dec 25, 2025Updated 2 months ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆29Jun 17, 2022Updated 3 years ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 2 months ago
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆267Feb 5, 2026Updated 3 weeks ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆56Dec 4, 2025Updated 2 months ago
- A packer project to generate Windows EVAL images to use it on test / dev / hack / IR labs☆24Jan 3, 2021Updated 5 years ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆58Dec 15, 2025Updated 2 months ago
- ☆10Feb 12, 2026Updated 2 weeks ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆38Dec 7, 2025Updated 2 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Oct 20, 2025Updated 4 months ago
- ☆28Mar 26, 2020Updated 5 years ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆99Dec 23, 2025Updated 2 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- ☆12Feb 4, 2025Updated last year
- Репозиторий, содержащий решения тасков и описание инцидента - RedShift190☆10Dec 26, 2023Updated 2 years ago
- ☆40Apr 3, 2023Updated 2 years ago
- Kerberoast Detection Script☆30Oct 31, 2024Updated last year
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆104Jan 26, 2026Updated last month
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆174Aug 13, 2025Updated 6 months ago
- ☆92Aug 23, 2021Updated 4 years ago
- This C# tool sprays for admin access over the entire domain☆88Dec 7, 2025Updated 2 months ago
- Python based GUI for browsing LDAP☆180Dec 7, 2025Updated 2 months ago
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆94Jun 28, 2025Updated 8 months ago
- AD ACL abuse☆388Sep 11, 2025Updated 5 months ago
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆65Jun 10, 2025Updated 8 months ago
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 9 months ago
- traefik stack for balenaCloud to proxy https domains to internal services☆11Oct 3, 2020Updated 5 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆24Nov 12, 2025Updated 3 months ago
- Admin Submission API allows submission of URLs, mail messages, file mail messages and files to Microsoft to re-scan and get newest verdic…☆10Aug 6, 2021Updated 4 years ago
- A Streamlit-based chatbot application using Gemini models for NLP. Features include light/dark mode toggle, model selection (Gemini 1.5 F…☆10May 23, 2024Updated last year
- Bruteratel☆13Oct 26, 2022Updated 3 years ago
- Mindmap for OWASP Top 10 LLM Application and Relationship between them☆13Dec 11, 2024Updated last year
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆74Updated this week