stevenyu113228 / BloodHound-MCP
☆79Updated this week
Alternatives and similar repositories for BloodHound-MCP:
Users that are interested in BloodHound-MCP are comparing it to the libraries listed below
- FindGPPPasswords, A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged…☆137Updated this week
- A cheatsheet for NetExec☆114Updated 2 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆102Updated last week
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆125Updated last year
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆149Updated 2 months ago
- ☆56Updated last week
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆174Updated last month
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆99Updated 3 weeks ago
- Make everyone in your VLAN ASRep roastable☆187Updated last month
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆126Updated last year
- Azure Post Exploitation Framework☆194Updated last month
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆148Updated 2 years ago
- ☆141Updated 4 months ago
- Continuous password spraying tool☆178Updated last month
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆123Updated last week
- Lab used for workshop and CTF☆177Updated 2 months ago
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆111Updated last year
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆181Updated 7 months ago
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆152Updated last month
- psexecsvc - a python implementation of PSExec's native service implementation☆188Updated last month
- ☆81Updated last month
- Find potential DLL Sideloads on your windows computer☆197Updated 2 months ago
- ☆190Updated 6 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆279Updated this week
- ☆232Updated this week
- Everything and anything related to password spraying☆133Updated 10 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆296Updated 4 months ago
- linikatz is a tool to attack AD on UNIX☆145Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆160Updated 3 months ago
- Parses Snaffler output file and generate beautified outputs.☆88Updated 2 months ago