zeronetworks / BloodHound-ToolsLinks
Collection of tools that reflect the network dimension into Bloodhound's data
☆443Updated 3 years ago
Alternatives and similar repositories for BloodHound-Tools
Users that are interested in BloodHound-Tools are comparing it to the libraries listed below
Sorting:
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆476Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.☆222Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆363Updated 4 months ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆447Updated 2 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆494Updated 2 years ago
- A PowerShell armoury for security guys and girls☆470Updated last year
- Kerberoast attack -pure python-☆436Updated last year
- ☆408Updated 5 months ago
- Identify the attack paths in BloodHound breaking your AD tiering☆323Updated 3 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆191Updated 4 years ago
- An Office365 User Attack Tool☆643Updated last year
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆236Updated 3 years ago
- Azure JWT Token Manipulation Toolset☆694Updated 11 months ago
- Infrastructure Automation☆356Updated last year
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆751Updated 2 months ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆285Updated last year
- LDAP library for auditing MS AD☆463Updated 3 weeks ago
- Python script that performs email address validation against Office 365 without submitting login attempts.☆369Updated 5 years ago
- Enumerate Domain Data☆334Updated 2 years ago
- Miscellaneous tools for BloodHound☆400Updated last year
- A PowerShell module to deploy active directory decoy objects.☆236Updated 5 years ago
- SMBeagle - Fileshare auditing tool.☆733Updated last week
- "Golden" certificates☆706Updated last year
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆327Updated 3 years ago
- Maximizing BloodHound. Max is a good boy.☆527Updated 6 months ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆231Updated 5 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆270Updated 2 years ago
- retrieve information via O365 and AzureAD with a valid cred☆730Updated 3 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆442Updated 3 years ago
- ☆412Updated last year