Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.
☆255Jul 29, 2021Updated 4 years ago
Alternatives and similar repositories for cypheroth
Users that are interested in cypheroth are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆269Apr 4, 2025Updated last year
- Maximizing BloodHound. Max is a good boy.☆533Apr 25, 2025Updated last year
- A curated list of awesome BloodhoundAD resources☆237Oct 13, 2022Updated 3 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆99Dec 8, 2022Updated 3 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆814Aug 28, 2022Updated 3 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆67Oct 3, 2020Updated 5 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆849Oct 29, 2025Updated 6 months ago
- ☆419Apr 28, 2021Updated 5 years ago
- Managed assembly shellcode generation☆282Mar 19, 2021Updated 5 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆486Jul 9, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆633Aug 15, 2025Updated 8 months ago
- PoSh BloodHound Dog Whisperer☆193May 23, 2023Updated 2 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆346Jul 21, 2020Updated 5 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆448Oct 19, 2022Updated 3 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆327Nov 6, 2022Updated 3 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆257Dec 2, 2021Updated 4 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,656Oct 11, 2018Updated 7 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆943Nov 11, 2024Updated last year
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Search for potential frontable domains☆646Mar 22, 2023Updated 3 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- Find vulnerabilities in AD Group Policy☆640Mar 25, 2022Updated 4 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,075Apr 29, 2026Updated last week
- Red Team C2 Infrastructure built in AWS using Ansible!☆232Oct 4, 2020Updated 5 years ago
- Extract credentials from lsass remotely☆2,200Mar 23, 2026Updated last month
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago
- C# Script used for Red Team☆722Nov 16, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆325Mar 26, 2019Updated 7 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Nov 9, 2019Updated 6 years ago
- Tool that automates Active Directory enumeration☆89Apr 24, 2021Updated 5 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆845Oct 3, 2021Updated 4 years ago
- Source for tasks I have used with Covenant☆121Mar 21, 2021Updated 5 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Apr 23, 2026Updated last week
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆609Aug 5, 2022Updated 3 years ago