200 shaares
13 private links
13 private links
4 results
tagged
windows
BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths.
Also, Ransomulator: https://github.com/zeronetworks/BloodHound-Tools/tree/main/Ransomulator
With these instructions, you can take the source code and turn it into Microsoft Word for Windows v1.1a Preview
Hyper-V vfd images plus configuration for 16bit client OSes