PlumHound
Vulnerability scanner
An Active Directory vulnerability reporting tool using BloodHoundAD's graph-based query engine
Bloodhound Reporting for Blue and Purple Teams
1k stars
38 watching
112 forks
Language: Python
last commit: over 1 year ago
Linked from 1 awesome list
activeactive-directoryactivedirectoryattack-pathsbloodhoundbloodhoundadbloodhoundad-cypher-queriesbloodhoundad-pathfinding-enginebluehoundblueteamcypher-querydirectoryinfosecneo4jplumhound-taskspurple-teamspurpleteamredteamreporting-tool
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Tools and utilities to support the BloodHound threat hunting framework | 380 |
| | A comprehensive database of vulnerability and exploitation reports | 248 |
| | Exploits vulnerabilities in Active Directory due to misconfigured ACLs using Python and BloodHound | 704 |
| | Automates searches for exploits and vulnerabilities across multiple databases | 988 |
| | A tool to identify vulnerabilities in web applications by probing for Open Redirections and other types of attacks. | 758 |
| | A Python-based tool for ingesting data into BloodHound, allowing analysis of network and Windows systems data. | 1,965 |
| | Automates vulnerability scanning and reporting by integrating multiple scanners into a unified platform | 1,362 |
| | Automates searching for vulnerabilities in databases and websites using predefined query patterns | 200 |
| | Research and experimentation with potential vulnerabilities in data hashing algorithms. | 1,480 |
| | A tool designed to demonstrate a vulnerability in Microsoft's OAuth Authorization Flow for phishing attacks | 94 |
| | A collection of tools for hackers and security researchers to explore vulnerabilities and test systems | 511 |
| | Real-time monitoring and notification tool to detect data leaks and credential breaches. | 520 |
| | Scans networks to identify vulnerabilities by correlating CPEs with CVEs using an API | 562 |
| | Exploits a known vulnerability in Oracle WebLogic to execute arbitrary code | 143 |
| | Contains public advisories, exploits, and code related to vulnerabilities and hacking. | 826 |