zeronetworks / BloodHound-Tools
Collection of tools that reflect the network dimension into Bloodhound's data
☆445Updated 2 years ago
Alternatives and similar repositories for BloodHound-Tools:
Users that are interested in BloodHound-Tools are comparing it to the libraries listed below
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆458Updated 8 months ago
- Kerberoast attack -pure python-☆427Updated last year
- LDAP library for auditing MS AD☆408Updated last week
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆487Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆485Updated 4 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆218Updated 2 years ago
- Azure JWT Token Manipulation Toolset☆643Updated 3 months ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆769Updated 2 years ago
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆302Updated 2 years ago
- Enumerate Domain Data☆326Updated last year
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆439Updated last year
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆145Updated 4 years ago
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆661Updated 4 months ago
- A PowerShell armoury for security guys and girls☆472Updated last year
- Identify the attack paths in BloodHound breaking your AD tiering☆317Updated 2 years ago
- A PowerShell module to deploy active directory decoy objects.☆226Updated 5 years ago
- Tool to audit and attack LAPS environments☆853Updated 7 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆217Updated 4 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆380Updated this week
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆433Updated 2 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆190Updated 3 years ago
- Miscellaneous tools for BloodHound☆390Updated 8 months ago
- ☆387Updated 7 months ago
- ☆661Updated last month
- "Golden" certificates☆660Updated 7 months ago
- scan for NTLM directories☆355Updated 9 months ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆835Updated 3 years ago
- Active Directory Lab for Penetration Testing☆50Updated 4 years ago
- A centralized resource for previously documented WDAC bypass techniques☆509Updated 11 months ago
- Maximizing BloodHound. Max is a good boy.☆507Updated last month