☆158Apr 4, 2025Updated last year
Alternatives and similar repositories for BloodHound-MCP
Users that are interested in BloodHound-MCP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- kernel callback removal (Bypassing EDR Detections)☆216Nov 14, 2025Updated 5 months ago
- A PowerShell console in C/C++ with all the security features disabled☆386Oct 14, 2025Updated 6 months ago
- A PoC for Early Cascade process injection technique.☆216Jan 30, 2025Updated last year
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆58Jul 13, 2025Updated 9 months ago
- ☆200Mar 28, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An Ansible collection that installs an SCCM deployment with optional configurations.☆107Dec 8, 2025Updated 5 months ago
- ☆235Oct 8, 2024Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆210Nov 4, 2025Updated 6 months ago
- Evasive shellcode loader☆400Oct 17, 2024Updated last year
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆371Apr 8, 2026Updated last month
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆399Sep 26, 2025Updated 7 months ago
- Azure Post Exploitation Framework☆246Oct 27, 2025Updated 6 months ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆144Apr 6, 2025Updated last year
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆401Jul 23, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆285Apr 6, 2025Updated last year
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆402Jan 14, 2026Updated 3 months ago
- remote process injections using pool party techniques☆71Jun 29, 2025Updated 10 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- Ghosting-AMSI☆236Apr 24, 2025Updated last year
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Active Directory share enumeration tool☆12Apr 28, 2025Updated last year
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆140Jan 18, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆227Nov 23, 2023Updated 2 years ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆49Apr 7, 2025Updated last year
- early cascade injection PoC based on Outflanks blog post☆241Nov 7, 2024Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆151Feb 10, 2025Updated last year
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆362Mar 17, 2026Updated last month
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆209Feb 16, 2026Updated 2 months ago
- SAM Dumping in C#☆55Nov 27, 2025Updated 5 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆269Apr 8, 2025Updated last year
- Use hardware breakpoint to dynamically change SSN in run-time☆281Apr 10, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆129Jan 17, 2026Updated 3 months ago
- Multiplayer pivoting solution☆510Apr 29, 2026Updated last week
- A beacon object file implementation of PoolParty Process Injection Technique.☆449Dec 21, 2023Updated 2 years ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆313Dec 9, 2023Updated 2 years ago
- ☆120May 29, 2025Updated 11 months ago
- Find potential DLL Sideloads on your windows computer☆220Jan 12, 2025Updated last year