xenoscr / SessionHound
A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo4j database.
☆19Updated 2 years ago
Alternatives and similar repositories for SessionHound:
Users that are interested in SessionHound are comparing it to the libraries listed below
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Python Script for SAML2 Authentication Passwordspray☆38Updated last year
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- Firebase Domain Front Code☆21Updated 3 years ago
- ☆19Updated 4 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆32Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 5 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆28Updated 5 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 2 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Walking the PEB in VBA☆22Updated 4 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆46Updated 4 years ago
- An Ansible role to install cobalt-strike☆16Updated 4 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 4 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- ☆52Updated 4 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- parsers to make life easier☆12Updated 4 years ago
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- ☆17Updated 4 years ago
- Ansible role to deploy RedELK server☆18Updated last year
- Modified version of PEAS client for offensive operations☆38Updated 2 years ago
- Ansible role that Installs Mythic☆14Updated 7 months ago
- Helpful operator notes and techniques in actionable form☆16Updated last year