zeronetworks / BloodHound-ToolsLinks
Collection of tools that reflect the network dimension into Bloodhound's data
☆443Updated 3 years ago
Alternatives and similar repositories for BloodHound-Tools
Users that are interested in BloodHound-Tools are comparing it to the libraries listed below
Sorting:
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆478Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.☆223Updated 3 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆447Updated 2 years ago
- A PowerShell armoury for security guys and girls☆470Updated last year
- LDAP library for auditing MS AD☆477Updated last month
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆494Updated 2 years ago
- ☆407Updated 6 months ago
- Identify the attack paths in BloodHound breaking your AD tiering☆322Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆366Updated 5 months ago
- Kerberoast attack -pure python-☆436Updated 2 years ago
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆752Updated 3 months ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆191Updated 4 years ago
- Deploy customizable Active Directory labs in Azure - automatically.☆427Updated last year
- Python script that performs email address validation against Office 365 without submitting login attempts.☆371Updated 5 years ago
- An Office365 User Attack Tool☆644Updated last year
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆237Updated 3 years ago
- Azure JWT Token Manipulation Toolset☆697Updated last year
- Miscellaneous tools for BloodHound☆402Updated last year
- Enumerate Domain Data☆335Updated 2 years ago
- "Golden" certificates☆705Updated last year
- A PowerShell module to deploy active directory decoy objects.☆238Updated 6 years ago
- Infrastructure Automation☆357Updated last year
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆443Updated 3 years ago
- Maximizing BloodHound. Max is a good boy.☆528Updated 7 months ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆825Updated last month
- SMBeagle - Fileshare auditing tool.☆736Updated last month
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆329Updated 3 years ago
- ☆368Updated 2 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆231Updated 5 years ago
- ☆412Updated last year