SharpHound
GPL-3.0🔥 Offensive Ops · C#
SharpHound is the official data collector for BloodHound, a tool used to visualize Active Directory environments. Written in C#, it enumerates Active Directory objects, sessions, access control lists (ACLs), and trust relationships, providing data for graph-based analysis of potential attack paths. SharpHound is essential for red teams seeking to understand and exploit complex Active Directory structures, enhancing strategic attack planning.
Use Cases
- Active Directory data collection for BloodHound
- Session and local admin enumeration
- ACL and GPO relationship mapping
- Trust relationship discovery
- Attack path analysis data gathering
Tags
Details
- Category
- 🔥 Offensive Ops
- Language
- C#
- Repository
- BloodHoundAD/SharpHound
- License
- GPL-3.0
- Platforms
- 🪟windows
Links
Alternatives & Comparisons
More in Offensive Ops
Mythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Havoc
C/C++Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
Rubeus
C#C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
Certipy
PythonActive Directory Certificate Services (AD CS) abuse tool. Find and exploit certificate template misconfigurations.
Coercer
PythonAutomatically find and exploit Windows authentication coercion vulnerabilities. PetitPotam, PrinterBug, and more.
BeEF
RubyBrowser Exploitation Framework. Hook browsers via XSS, then pivot into the network using browser-based attacks.