layer8secure / The-Storfield-MethodologyLinks
A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
☆22Updated 2 years ago
Alternatives and similar repositories for The-Storfield-Methodology
Users that are interested in The-Storfield-Methodology are comparing it to the libraries listed below
Sorting:
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- Living off the land searches for explorer and sharepoint☆83Updated last month
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Abuse Azure API permissions for red teaming☆67Updated 2 years ago
- ☆69Updated last week
- A Python POC for CRED1 over SOCKS5☆149Updated 8 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆27Updated 4 months ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆39Updated 3 months ago
- BloodHound PowerShell client☆53Updated last month
- An Ansible collection that installs an ADFS deployment with optional configurations.☆39Updated 5 months ago
- Microsoft Graph API post-exploitation toolkit☆94Updated 10 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Lifetime AMSI bypass.☆35Updated last month
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆73Updated last week
- Lateral Movement☆125Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆81Updated 8 months ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆45Updated this week
- ☆52Updated last week
- Automated exploitation of MSSQL servers at scale☆108Updated 2 weeks ago
- Your Skyfall Infrastructure Pack☆74Updated 2 weeks ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆39Updated 4 months ago
- Custom queries list for BloodHound☆28Updated 9 months ago
- Deploy a phishing infrastructure on the fly.☆69Updated 5 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆91Updated last month
- Living Off the Foreign Land setup scripts☆70Updated 3 months ago
- ☆25Updated 2 years ago
- ☆65Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆35Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago
- ☆71Updated last year