Category: Post Exploitation


BloodHound v5.9 releases: Active Directory Toolkit

BloodHound BloodHound is a single-page Javascript web application, built on top of Linkurious, compiled with Electron, with a Neo4j database fed by a PowerShell ingestor. BloodHound uses graph theory to reveal the hidden and often unintended...

Kerberos abuse

Kerbeus-BOF: Beacon Object Files for Kerberos abuse

Kerbeus-BOF Beacon Object Files for Kerberos abuse. This is an implementation of some important features of the Rubeus project, written in C. The project features integration with the C2 frameworks Cobalt Strike and Havoc. Download git clone Use...

cross-platform C2

Medusa: cross-platform C2 agent

Medusa Medusa is a cross-platform C2 agent compatible with both Python 3.8 and Python 2.7. Notable Features Dynamic loading/unloading of agent functions to limit exposure of agent capabilities on-disk. Loading of Python modules in-memory...