zeronetworks / BloodHound-Tools
Collection of tools that reflect the network dimension into Bloodhound's data
☆446Updated 2 years ago
Alternatives and similar repositories for BloodHound-Tools:
Users that are interested in BloodHound-Tools are comparing it to the libraries listed below
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆459Updated 9 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆489Updated 2 years ago
- Azure JWT Token Manipulation Toolset☆649Updated 4 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆218Updated 2 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆318Updated 2 years ago
- ☆673Updated 2 months ago
- "Golden" certificates☆663Updated 8 months ago
- Check for LDAP protections regarding the relay of NTLM authentication☆490Updated 4 months ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆347Updated 2 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆772Updated 2 years ago
- Kerberoast attack -pure python-☆427Updated last year
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆437Updated last year
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆666Updated 5 months ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆383Updated 3 weeks ago
- Python script that performs email address validation against Office 365 without submitting login attempts.☆340Updated 4 years ago
- A centralized resource for previously documented WDAC bypass techniques☆509Updated 11 months ago
- Enumerate Domain Data☆325Updated last year
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆459Updated 2 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆482Updated last year
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆216Updated 4 years ago
- LDAP library for auditing MS AD☆412Updated last month
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆232Updated 2 years ago
- A C# utility for interacting with SCCM☆626Updated 7 months ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆839Updated 3 years ago
- A PowerShell module to deploy active directory decoy objects.☆226Updated 5 years ago
- Active Directory Lab for Penetration Testing☆50Updated 4 years ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆658Updated 4 months ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆264Updated 11 months ago
- An Office365 User Attack Tool☆633Updated last year
- Infrastructure Automation☆344Updated last year