layer8secure / The-Storfield-Methodology
A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
☆22Updated 2 years ago
Alternatives and similar repositories for The-Storfield-Methodology
Users that are interested in The-Storfield-Methodology are comparing it to the libraries listed below
Sorting:
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆47Updated 2 months ago
- Living off the land searches for explorer and sharepoint☆82Updated 3 weeks ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆27Updated 4 months ago
- ☆64Updated 2 weeks ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆80Updated last month
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆66Updated 4 months ago
- Your Skyfall Infrastructure Pack☆69Updated this week
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 11 months ago
- Custom queries list for BloodHound☆28Updated 8 months ago
- ☆42Updated last month
- Lifetime AMSI bypass.☆34Updated 3 weeks ago
- BloodHound PowerShell client☆53Updated last month
- An Ansible collection that installs an ADFS deployment with optional configurations.☆30Updated 4 months ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆39Updated 2 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆32Updated 2 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 8 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆32Updated last year
- Scripts that automate portions of pentests.☆50Updated 2 weeks ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- ☆44Updated 10 months ago
- Claude MCP server to perform analysis on ROADrecon data☆37Updated last month
- ☆50Updated 6 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- Deploy a phishing infrastructure on the fly.☆68Updated 4 months ago
- ☆51Updated last year
- Abuse Azure API permissions for red teaming☆67Updated 2 years ago
- ☆54Updated 3 months ago
- A Python POC for CRED1 over SOCKS5☆149Updated 7 months ago