stevenyu113228 / BloodHound-MCPView external linksLinks
☆159Apr 4, 2025Updated 10 months ago
Alternatives and similar repositories for BloodHound-MCP
Users that are interested in BloodHound-MCP are comparing it to the libraries listed below
Sorting:
- ☆235Oct 8, 2024Updated last year
- kernel callback removal (Bypassing EDR Detections)☆211Nov 14, 2025Updated 3 months ago
- A PoC for Early Cascade process injection technique.☆208Jan 30, 2025Updated last year
- ☆198Mar 28, 2025Updated 10 months ago
- An Ansible collection that installs an SCCM deployment with optional configurations.☆101Dec 8, 2025Updated 2 months ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆55Jul 13, 2025Updated 7 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 3 months ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆135Apr 6, 2025Updated 10 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 6 months ago
- A PowerShell console in C/C++ with all the security features disabled☆342Oct 14, 2025Updated 4 months ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆384Sep 26, 2025Updated 4 months ago
- Evasive shellcode loader☆398Oct 17, 2024Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆282Apr 6, 2025Updated 10 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆197Nov 4, 2025Updated 3 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆398Jan 14, 2026Updated last month
- remote process injections using pool party techniques☆70Jun 29, 2025Updated 7 months ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- ☆120May 29, 2025Updated 8 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆214Oct 19, 2024Updated last year
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆354Jan 8, 2026Updated last month
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- A beacon object file implementation of PoolParty Process Injection Technique.☆432Dec 21, 2023Updated 2 years ago
- ☆235May 19, 2025Updated 8 months ago
- Use hardware breakpoint to dynamically change SSN in run-time☆279Apr 10, 2024Updated last year
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆501Jan 23, 2026Updated 3 weeks ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆307Dec 9, 2023Updated 2 years ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆141Jan 18, 2025Updated last year
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆188Dec 23, 2025Updated last month
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆359Jan 29, 2026Updated 2 weeks ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆266Apr 8, 2025Updated 10 months ago
- Lifetime AMSI bypass by @ZeroMemoryEx ported to .NET Framework 4.8☆351Aug 29, 2024Updated last year
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆355Apr 26, 2025Updated 9 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆208Dec 25, 2024Updated last year
- Find potential DLL Sideloads on your windows computer☆219Jan 12, 2025Updated last year
- Ghosting-AMSI☆222Apr 24, 2025Updated 9 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Nov 27, 2024Updated last year
- PowerShell Obfuscator☆229Aug 28, 2025Updated 5 months ago
- .NET assembly loader with patchless AMSI and ETW bypass☆366Apr 19, 2023Updated 2 years ago