Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/byt3n33dl3/bark
Versatile tool for BloodHound, an attack research kit in my own version and modification
https://github.com/byt3n33dl3/bark
bark bloodhound kit powershell
Last synced: 7 days ago
JSON representation
Versatile tool for BloodHound, an attack research kit in my own version and modification
- Host: GitHub
- URL: https://github.com/byt3n33dl3/bark
- Owner: byt3n33dl3
- License: gpl-3.0
- Created: 2024-05-21T06:07:39.000Z (6 months ago)
- Default Branch: main
- Last Pushed: 2024-05-21T06:46:37.000Z (6 months ago)
- Last Synced: 2024-09-18T06:33:22.561Z (about 2 months ago)
- Topics: bark, bloodhound, kit, powershell
- Language: PowerShell
- Homepage:
- Size: 170 KB
- Stars: 10
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
### Barking through Bark
![bark](https://github.com/Sulaimannabdul/Barking/assets/151133481/ee400007-4db2-4826-8fd4-78bc8989d572)
BARK stands for BloodHound Attack Research Kit. It is a PowerShell script built to assist the BloodHound Enterprise team with researching and continuously validating abuse primitives. BARK currently focuses on Microsoft's Azure suite of products and services.
BARK requires no third party dependencies. BARK's functions are designed to be as simple and maintainable as possible. Most functions are very simple wrappers for making requests to various REST API endpoints. BARK's basic functions do not even require each other - you can pull almost any BARK function out of BARK and it will work perfectly as a standalone function in your own scripts.
***Barking*** is a versatile tool for Bloodhounds, aiding in their effectiveness as trackers and enhancing their ability to communicates.
***BARKING*** or ***BARK*** has nothing to do with [***Sharphound/HarpoonHound.***](https://github.com/Sulaimannabdul/harpoonhound)
## Meta Functions
* ``Invoke-ExternalAbuseTest`` performs all abuse validation tests that can be executed by holding an MS Graph app role.
* ``Invoke-AllAzureADAbuseTests`` performs all abuse validation tests that can be executed by principals granted AzureAD admin roles.
* ``ConvertTo-Targets`` is used for massaging output from the Invoke-Tests functions for usage in another platform.![Apache_Bloodhound-Logo wine](https://github.com/Sulaimannabdul/Barking/assets/151133481/4a71bcaa-f5e8-4e81-bb1b-944d189cfc9d)
#### **Credit to bloodhound and bark repo.**