zeronetworks / BloodHound-ToolsLinks
Collection of tools that reflect the network dimension into Bloodhound's data
☆445Updated 3 years ago
Alternatives and similar repositories for BloodHound-Tools
Users that are interested in BloodHound-Tools are comparing it to the libraries listed below
Sorting:
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆478Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.☆223Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆366Updated 6 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆494Updated 2 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆448Updated 2 years ago
- ☆407Updated 6 months ago
- Identify the attack paths in BloodHound breaking your AD tiering☆324Updated 3 years ago
- Kerberoast attack -pure python-☆436Updated 2 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆191Updated 4 years ago
- A PowerShell armoury for security guys and girls☆470Updated last year
- LDAP library for auditing MS AD☆479Updated 2 months ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆236Updated 3 years ago
- Azure JWT Token Manipulation Toolset☆701Updated last year
- An Office365 User Attack Tool☆645Updated last year
- Python script that performs email address validation against Office 365 without submitting login attempts.☆372Updated 5 years ago
- Infrastructure Automation☆358Updated last year
- Maximizing BloodHound. Max is a good boy.☆530Updated 8 months ago
- "Golden" certificates☆705Updated last year
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆761Updated 4 months ago
- Deploy customizable Active Directory labs in Azure - automatically.☆428Updated last year
- Check for LDAP protections regarding the relay of NTLM authentication☆527Updated last year
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆289Updated last year
- Red Team C2 Infrastructure built in AWS using Ansible!☆231Updated 5 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆830Updated last month
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆331Updated 3 years ago
- ☆368Updated 2 years ago
- Miscellaneous tools for BloodHound☆402Updated last year
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆408Updated 9 months ago
- Enumerate Domain Data☆335Updated 2 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆443Updated 3 years ago