xenoscr / SessionHoundLinks
A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo4j database.
☆19Updated 2 years ago
Alternatives and similar repositories for SessionHound
Users that are interested in SessionHound are comparing it to the libraries listed below
Sorting:
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆32Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- ☆18Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- ☆32Updated 5 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- ☆20Updated 5 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆23Updated 4 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 4 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Updated 3 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Updated 2 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- UglyEXe - bypass some AVs☆17Updated 5 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆28Updated 5 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- ☆24Updated 4 years ago
- treafik fronted c2 examples☆26Updated 4 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago