My BloodHound custom queries
☆26Jan 10, 2023Updated 3 years ago
Alternatives and similar repositories for BloodHoundCustomQueries
Users that are interested in BloodHoundCustomQueries are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Collection of cyphers for bloodhound☆157Jun 26, 2024Updated last year
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 2 months ago
- ☆22Jun 21, 2022Updated 3 years ago
- My implementation of Halo's Gate technique in C#☆54Apr 20, 2022Updated 3 years ago
- TokenCert☆102Nov 15, 2024Updated last year
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- ManageEngine OpManager Decryption Tools☆32Sep 6, 2022Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- ☆185Dec 4, 2024Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆103May 6, 2024Updated last year
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆91Oct 13, 2024Updated last year
- PortBender修改为exe版本☆29Jul 24, 2023Updated 2 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆28Jan 4, 2024Updated 2 years ago
- SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and s…☆63Sep 2, 2020Updated 5 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆258May 10, 2023Updated 2 years ago
- Abusing Azure services over C2☆367Jan 20, 2026Updated 2 months ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- A webshell plugin and interactive shell for pentesting JoGet application.☆14May 19, 2022Updated 3 years ago
- ☆94May 26, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- A C# utility for interacting with SCCM☆686Aug 20, 2025Updated 7 months ago
- Use Rust to implement some Red Team techniques :)☆13Nov 11, 2024Updated last year
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆253Mar 7, 2022Updated 4 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- Golang implement winrm client with pass the hash☆32Apr 29, 2024Updated last year
- DPAPI looting remotely and locally in Python☆543Mar 13, 2026Updated last week
- Continuous password spraying tool☆204Mar 12, 2026Updated last week
- Recovering NTLM hashes from Credential Guard☆377Dec 26, 2022Updated 3 years ago
- ☆38Jan 7, 2025Updated last year