seajaysec / cypherothView external linksLinks
Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.
☆255Jul 29, 2021Updated 4 years ago
Alternatives and similar repositories for cypheroth
Users that are interested in cypheroth are comparing it to the libraries listed below
Sorting:
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆267Apr 4, 2025Updated 10 months ago
- Maximizing BloodHound. Max is a good boy.☆531Apr 25, 2025Updated 9 months ago
- A curated list of awesome BloodhoundAD resources☆238Oct 13, 2022Updated 3 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Dec 8, 2022Updated 3 years ago
- ☆413Apr 28, 2021Updated 4 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆610Aug 15, 2025Updated 5 months ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆811Aug 28, 2022Updated 3 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆67Oct 3, 2020Updated 5 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆482Jul 9, 2024Updated last year
- Managed assembly shellcode generation☆280Mar 19, 2021Updated 4 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆447Oct 19, 2022Updated 3 years ago
- Tool that automates Active Directory enumeration☆88Apr 24, 2021Updated 4 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆834Oct 29, 2025Updated 3 months ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆232Oct 4, 2020Updated 5 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- PoSh BloodHound Dog Whisperer☆193May 23, 2023Updated 2 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,637Oct 11, 2018Updated 7 years ago
- Search for potential frontable domains☆644Mar 22, 2023Updated 2 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆348Jul 21, 2020Updated 5 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,050Jan 22, 2026Updated 3 weeks ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆257Dec 2, 2021Updated 4 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆930Nov 11, 2024Updated last year
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Feb 1, 2022Updated 4 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 6 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆326Nov 6, 2022Updated 3 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆608Aug 5, 2022Updated 3 years ago
- C# Script used for Red Team☆724Nov 16, 2021Updated 4 years ago
- Find vulnerabilities in AD Group Policy☆641Mar 25, 2022Updated 3 years ago
- NTLM relaying for Windows made easy☆579Apr 25, 2023Updated 2 years ago
- DAFT: Database Audit Framework & Toolkit☆182Aug 11, 2021Updated 4 years ago
- Source for tasks I have used with Covenant☆122Mar 21, 2021Updated 4 years ago
- A port of FuzzySecurity's UrbanBishop project for inline shellcode execution☆119Sep 29, 2020Updated 5 years ago
- Extract credentials from lsass remotely☆2,176Dec 24, 2025Updated last month
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆232Jun 10, 2022Updated 3 years ago