layer8secure / The-Storfield-Methodology
A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
☆22Updated 2 years ago
Alternatives and similar repositories for The-Storfield-Methodology:
Users that are interested in The-Storfield-Methodology are comparing it to the libraries listed below
- Living off the land searches for explorer and sharepoint☆56Updated 3 months ago
- A Python POC for CRED1 over SOCKS5☆139Updated 4 months ago
- Custom queries list for BloodHound☆23Updated 5 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 9 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆76Updated last week
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆33Updated 3 weeks ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆91Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆37Updated 2 years ago
- 🌩️ Collection of BloodHound queries for Azure☆57Updated last month
- Living Off the Foreign Land setup scripts☆64Updated last month
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆109Updated 9 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆82Updated last month
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆108Updated 3 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆22Updated last month
- BloodHound PowerShell client☆49Updated this week
- An Ansible collection that installs an ADFS deployment with optional configurations.☆27Updated last month
- Microsoft Graph API post-exploitation toolkit☆93Updated 7 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆36Updated 10 months ago
- Lifetime AMSI bypass.☆35Updated 7 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆26Updated last year
- ☆43Updated 7 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆68Updated 5 months ago
- Lateral Movement☆122Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆131Updated 6 months ago
- ☆39Updated 3 weeks ago
- Parses Snaffler output file and generate beautified outputs.☆71Updated 3 weeks ago
- PowerShell Reverse Shell☆61Updated last year
- Efflanrs - GUI for Snaffler Output☆24Updated 5 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆83Updated 7 months ago