xenoscr / Useful-BloodHound-QueriesView external linksLinks
A collection of Neo4j/BloodHound queries to collect interesting information.
☆47May 9, 2022Updated 3 years ago
Alternatives and similar repositories for Useful-BloodHound-Queries
Users that are interested in Useful-BloodHound-Queries are comparing it to the libraries listed below
Sorting:
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and s…☆63Sep 2, 2020Updated 5 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆74Feb 28, 2020Updated 5 years ago
- Microsoft External Attack Tool☆178Dec 8, 2022Updated 3 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆447Oct 19, 2022Updated 3 years ago
- ☆21Mar 16, 2021Updated 4 years ago
- wordlists for password cracking☆28Aug 15, 2022Updated 3 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Nov 14, 2020Updated 5 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- Get file less command execution for lateral movement.☆634Jun 3, 2022Updated 3 years ago
- Beacon Object File (BOF) Creation Helper☆236May 3, 2022Updated 3 years ago
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆196Jul 26, 2020Updated 5 years ago
- Aggressor Script to Execute Assemblies from Github☆71Nov 30, 2020Updated 5 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Feb 2, 2020Updated 6 years ago
- Executes position independent shellcode from an encrypted zip☆304Dec 22, 2020Updated 5 years ago
- D/Invoke port of UrbanBishop☆108Jul 19, 2020Updated 5 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆218Mar 5, 2020Updated 5 years ago
- ☆181Feb 3, 2021Updated 5 years ago
- Collection of VBA macro published in our twitter / blog☆160Sep 5, 2022Updated 3 years ago
- A "no frills" 1 class-only, C# .NET command line parser with support for - and / args, switches only, and Name : Values☆34Jan 20, 2026Updated 3 weeks ago
- A little implant which SSH's back with a shell☆38Feb 1, 2022Updated 4 years ago
- ☆112Jul 24, 2023Updated 2 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆229Jul 30, 2021Updated 4 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆191Mar 4, 2021Updated 4 years ago
- ☆667Nov 17, 2021Updated 4 years ago
- Search files for extensions as well as text within.☆120Sep 28, 2021Updated 4 years ago
- DInvisibleRegistry☆82Nov 20, 2020Updated 5 years ago
- An async Python client library for Empire's RESTful API☆26Dec 6, 2023Updated 2 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Mar 2, 2022Updated 3 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆205Nov 8, 2020Updated 5 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆610Aug 15, 2025Updated 5 months ago
- CVE-2024-40711-exp☆42Oct 17, 2024Updated last year
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆50May 3, 2022Updated 3 years ago
- ☆73Oct 24, 2021Updated 4 years ago