layer8secure / The-Storfield-MethodologyLinks
A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
☆22Updated 3 years ago
Alternatives and similar repositories for The-Storfield-Methodology
Users that are interested in The-Storfield-Methodology are comparing it to the libraries listed below
Sorting:
- Living off the land searches for explorer and sharepoint☆91Updated 5 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆131Updated 2 months ago
- ☆86Updated 2 months ago
- C2 Automation using Linode☆85Updated 3 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Malware As A Service☆135Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆87Updated 2 months ago
- Artifact monitoring that ensures fairplay☆78Updated 8 months ago
- AAD related enumeration in Nim☆131Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆95Updated 2 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- ☆161Updated last year
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- Payload Generation Workflow☆40Updated 2 months ago
- Custom queries list for BloodHound☆30Updated 2 months ago
- Your Skyfall Infrastructure Pack☆76Updated last month
- ☆119Updated 6 months ago
- Deploy a phishing infrastructure on the fly.☆75Updated 9 months ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆72Updated 6 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆88Updated 9 months ago
- Logging tool intended for red team usage☆33Updated last month
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆83Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆44Updated last year
- Cortex XDR Config Extractor☆134Updated 2 years ago
- A small red team course☆39Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆42Updated 8 months ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆95Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆177Updated 2 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆151Updated 9 months ago