Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀
-
Updated
Oct 21, 2024 - Rust
Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀
Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀
Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges
Internal data collector for BloodHound and BlackMarlinExec pathway strategies through LDAP.
A clear and structured cheatsheet designed for BloodHound users. This guide explains what BloodHound does, how to install it from scratch, and how to run common AD enumeration and analysis tasks. Built for beginners and professionals who want a quick reference while mapping Active Directory attack paths.
custom bloodhound queries and knowledge base
Active Directory data collector for BloodHound written in Bash💲🐺
Active Directory data collector for BloodHound written in Bash💲🐺
Hybrid Red Team + Blue Team cybersecurity lab demonstrating complete Active Directory attack chain (BloodHound, Kerberoasting, WinPEAS, Mimikatz, Metasploit) and real-time threat detection using Sysmon telemetry + Wazuh SIEM with MITRE ATT&CK mapping.
🐾 Collect Active Directory data with BashHound, a lightweight BloodHound collector written in Bash for Linux, generating JSON files for analysis.
Add a description, image, and links to the sharphound topic page so that developers can more easily learn about it.
To associate your repository with the sharphound topic, visit your repo's landing page and select "manage topics."