☆143Oct 31, 2023Updated 2 years ago
Alternatives and similar repositories for CrackHound
Users that are interested in CrackHound are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆94May 14, 2022Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- ☆105Jul 31, 2024Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆103May 6, 2024Updated last year
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆416Jan 27, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Identify the attack paths in BloodHound breaking your AD tiering☆327Nov 6, 2022Updated 3 years ago
- Beacon Object Files for roasting Active Directory☆237Feb 21, 2022Updated 4 years ago
- Custom Queries - Brought Up to BH4.1 syntax☆275Dec 7, 2025Updated 4 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Remote operations commands implemented using Beacon Object Files☆1,146Mar 5, 2026Updated last month
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆485Jul 9, 2024Updated last year
- Maximizing BloodHound. Max is a good boy.☆532Apr 25, 2025Updated 11 months ago
- Some scripts to support with importing large datasets into BloodHound☆81Nov 28, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆289Aug 18, 2021Updated 4 years ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆58Feb 20, 2022Updated 4 years ago
- OPSEC safe Kerberoasting in C#☆198Jun 14, 2022Updated 3 years ago
- Recovering NTLM hashes from Credential Guard☆379Dec 26, 2022Updated 3 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆253Mar 7, 2022Updated 4 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆484Oct 14, 2022Updated 3 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆135May 25, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆401Aug 15, 2025Updated 7 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆395Feb 23, 2024Updated 2 years ago
- ☆16May 20, 2022Updated 3 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,375Oct 27, 2023Updated 2 years ago
- Partial python implementation of SharpGPOAbuse☆542Mar 30, 2026Updated 2 weeks ago
- Start new PowerShell without etw and amsi in pure nim☆157Feb 14, 2022Updated 4 years ago
- Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.☆171Jan 25, 2024Updated 2 years ago
- Generate graphs and charts based on password cracking result☆164Feb 17, 2023Updated 3 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆137Jan 22, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A standalone DLL that exports databases in cleartext once injected in the KeePass process.☆301Mar 1, 2023Updated 3 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,638Aug 6, 2022Updated 3 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- Decrypt Veeam database passwords☆222Dec 8, 2025Updated 4 months ago
- ADCS cert template modification and ACL enumeration☆143Jun 26, 2023Updated 2 years ago
- Convenience tool for hashcat☆121Aug 26, 2025Updated 7 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,275Dec 9, 2025Updated 4 months ago