https://github.com/freeload101/Java-Android-Magisk-Burp-Objection-Root-Emulator-Easy
Six Degrees of Domain Admin
https://www.google.com/search?q=%22shortestPath%22+%22bloodhound%22+site:github.com
https://github.com/drak3hft7/Cheat-Sheet---Active-Directory
https://gist.github.com/jeffmcjunkin/7b4a67bb7dd0cfbfbd83768f3aa6eb12
https://hausec.com/2019/09/09/bloodhound-cypher-cheatsheet/
https://github.com/BloodHoundAD/BloodHound/wiki/Cypher-Query-Gallery
https://bloodhoundhq.slack.com ( not sure how to get invite )
BloodHound Portable for Windows (You can run this without local admin. No Administrator required)
- Download the .bat file
- Run as a normal domain user
- Alternatively you can use Runas.exe inside of a VM under domain user context with
runas /netonly /user:"US.COMPANY.DOMAIN.COM\[email protected]" cmd
or try/user:"DOMAIN\USERNAME"
to run SharpHound.exe
Parse Sharphound Output Pretty_Bloodhound.py ( not needed they fixed it )
** You may need to whitelist or disable Bloodhound/Sharphound in your Endpoint Security Software ( Or just obfucate it if your lucky... Resource Hacker or echo '' >> Sharphound.exe etc ... ) **
** Last tested Bloodhound 4.1.0 **
Credit: https://bloodhound.readthedocs.io/en/latest/_images/SharpHoundCheatSheet.png