Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.
☆255Jul 29, 2021Updated 4 years ago
Alternatives and similar repositories for cypheroth
Users that are interested in cypheroth are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆269Apr 4, 2025Updated 11 months ago
- Maximizing BloodHound. Max is a good boy.☆532Apr 25, 2025Updated 11 months ago
- A curated list of awesome BloodhoundAD resources☆237Oct 13, 2022Updated 3 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Dec 8, 2022Updated 3 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆809Aug 28, 2022Updated 3 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆839Oct 29, 2025Updated 4 months ago
- ☆418Apr 28, 2021Updated 4 years ago
- Managed assembly shellcode generation☆281Mar 19, 2021Updated 5 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆484Jul 9, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆623Aug 15, 2025Updated 7 months ago
- PoSh BloodHound Dog Whisperer☆192May 23, 2023Updated 2 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆347Jul 21, 2020Updated 5 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Oct 19, 2022Updated 3 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆326Nov 6, 2022Updated 3 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆257Dec 2, 2021Updated 4 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,651Oct 11, 2018Updated 7 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆935Nov 11, 2024Updated last year
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Search for potential frontable domains☆643Mar 22, 2023Updated 3 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- Find vulnerabilities in AD Group Policy☆641Mar 25, 2022Updated 4 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,065Updated this week
- Red Team C2 Infrastructure built in AWS using Ansible!☆232Oct 4, 2020Updated 5 years ago
- Extract credentials from lsass remotely☆2,184Dec 24, 2025Updated 3 months ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago
- C# Script used for Red Team☆723Nov 16, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 7 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Nov 9, 2019Updated 6 years ago
- Tool that automates Active Directory enumeration☆88Apr 24, 2021Updated 4 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆844Oct 3, 2021Updated 4 years ago
- Source for tasks I have used with Covenant☆121Mar 21, 2021Updated 5 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Feb 1, 2022Updated 4 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆608Aug 5, 2022Updated 3 years ago