GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.
-
Updated
Jun 20, 2017 - PowerShell
GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.
List of Bloodhound Python Custom Queries which I have found to be handy on engagements
Reproducible and extensible BloodHound playbooks
A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc
A snaplet wrapping access to ElasticSearch via the bloodhound package.
An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by Layer 8.
Responsive React 'The Movie Database' (TMDb) App
Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.
Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.
Recopilación de técnicas de explotación de Active Directory.
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
Rakound is a tool written in Python that interacts with BloodHound database (neo4j) to retrieve data, add NTLM hashes and cracked passwords.
A curated list of awesome Active Directory Penetration Testing and attack resources
The Old BloodHound C# Ingestor (Deprecated)
Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format
Detect connections between Bloodhound objects wich are considered illegal by AD Tiering from Microsoft
A collection of utility scripts/files designed to extend/facilitate Bloodhound capabilities.
Add a description, image, and links to the bloodhound topic page so that developers can more easily learn about it.
To associate your repository with the bloodhound topic, visit your repo's landing page and select "manage topics."