BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse entities and configurable, traversable attack paths.
-
Updated
Mar 4, 2026 - Python
BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse entities and configurable, traversable attack paths.
Salesforce identity and permission graph collector for BloodHound CE. Maps users, profiles, permission sets, roles, groups, sharing rules, connected apps, and field-level security into attack-path graphs.
Offline-first threat modeling and architecture diagram editor with AI-powered security analysis, MITRE ATT&CK/NIST mapping, local Ollama support, and integrated GRC attack-path workflows.
Z-Hound is a single-file web app that parses SharpHound collection ZIPs and renders an interactive attack graph of your Active Directory environment. It runs entirely in your browser - nothing leaves your machin.
Real-time cloud attack path prediction and simulation
AI-Powered Active Directory Attack Path Analysis with BloodHound - By Ayi NEDJIMI
AI-powered attack path synthesizer with cross-tool integration — ingest findings from 45+ tools, build knowledge graphs, and synthesize realistic attack paths with MITRE ATT&CK mappings
🛒 Build an online marketplace with AAPP-MART, a simple yet powerful solution for managing products, users, and transactions seamlessly.
Add a description, image, and links to the attack-path topic page so that developers can more easily learn about it.
To associate your repository with the attack-path topic, visit your repo's landing page and select "manage topics."