There are 1 repository under bloodhound topic.
linWinPwn is a bash script that streamlines the use of a number of Active Directory tools
Responsive React 'The Movie Database' (TMDb) App
Active Directory data collector for BloodHound written in Rust. 🦀
GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.
The Old BloodHound C# Ingestor (Deprecated)
A collection of CTF write-ups, pentesting topics, guides and notes. Notes compiled from multiple sources and my own lab research. Topics also support OSCP, Active Directory, CRTE, eJPT and eCPPT.
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel
Identify the attack paths in BloodHound breaking your AD tiering
Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.
A Red Team Activity Hub
BloodHound Docker Ready to Use
Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.
Data and exploit collector for 𝙎𝙝𝙖𝙧𝙥𝙃𝙤𝙪𝙣𝙙 to 𝘽𝙡𝙤𝙤𝙙𝙃𝙤𝙪𝙣𝙙. This software will automatically determine what domain or directory the current user belongs to. ( BOF.NET )
Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format
Tool for issuing manual LDAP queries which offers bofhound compatible output
Reproducible and extensible BloodHound playbooks
Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.
Convert an LDIF file to JSON files ingestible by BloodHound
Six Degrees of Domain Admin
List of Bloodhound Python Custom Queries which I have found to be handy on engagements
Custom queries list for BloodHound
An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by Layer 8.
A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc
custom bloodhound queries and knowledge base
Rakound is a tool written in Python that interacts with BloodHound database (neo4j) to retrieve data, add NTLM hashes and cracked passwords.
A collection of utility scripts/files designed to extend/facilitate Bloodhound capabilities.
A curated list of awesome Active Directory Penetration Testing and attack resources
Run BloodHound CE in a single-user setup with podman
Recopilación de técnicas de explotación de Active Directory.