shellinvictus / GriffonADLinks
A new tool to exploit automatically bad configurations in Active Directory with BloodHound json files
☆59Updated 3 weeks ago
Alternatives and similar repositories for GriffonAD
Users that are interested in GriffonAD are comparing it to the libraries listed below
Sorting:
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆375Updated 4 months ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆351Updated 3 weeks ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆211Updated 6 months ago
- Reaping treasures from strings in remote processes memory☆284Updated 10 months ago
- A visual methodology tracking platform tailored for offensive security assessments☆235Updated 3 months ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆307Updated this week
- ☆164Updated last month
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆106Updated 4 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆426Updated 2 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆213Updated last week
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆274Updated last week
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆134Updated 7 months ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆347Updated 3 months ago
- Group Policy Objects manipulation and exploitation framework☆283Updated 3 weeks ago
- Sliver CheatSheet for OSEP☆220Updated last month
- Windows protocol library, including SMB and RPC implementations, among others.☆595Updated last month
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆36Updated 2 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆43Updated 8 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆415Updated this week
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆415Updated last week
- Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and book…☆119Updated last week
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆207Updated 3 months ago
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆250Updated 6 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆262Updated 7 months ago
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆641Updated 2 months ago
- ☆376Updated 2 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆260Updated 7 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆171Updated last week
- Generate and Manage KeyCredentialLinks☆180Updated 2 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆165Updated 5 months ago