layer8secure / The-Storfield-MethodologyLinks
A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
☆22Updated 2 years ago
Alternatives and similar repositories for The-Storfield-Methodology
Users that are interested in The-Storfield-Methodology are comparing it to the libraries listed below
Sorting:
- Malware As A Service☆134Updated last year
- ☆72Updated last week
- Living off the land searches for explorer and sharepoint☆89Updated 2 months ago
- ☆159Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆109Updated last month
- ☆105Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated 11 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆140Updated 3 weeks ago
- ☆118Updated 3 months ago
- C2 Automation using Linode☆82Updated 2 years ago
- BloodHound PowerShell client☆56Updated 2 weeks ago
- PowerShell Reverse Shell☆78Updated 2 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆86Updated last week
- A community-driven collection of BloodHound queries☆67Updated 2 weeks ago
- Artifact monitoring that ensures fairplay☆75Updated 5 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆174Updated 2 months ago
- Your Skyfall Infrastructure Pack☆76Updated 2 months ago
- Efflanrs - GUI for Snaffler Output☆26Updated 10 months ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆69Updated 3 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆85Updated 6 months ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆93Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆117Updated last month
- Decrypt GlobalProtect configuration and cookie files.☆150Updated 10 months ago
- A Python POC for CRED1 over SOCKS5☆151Updated 9 months ago
- Custom queries list for BloodHound☆29Updated last week
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆115Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Updated 10 months ago
- Abuse Azure API permissions for red teaming☆67Updated 2 years ago