layer8secure / The-Storfield-Methodology
A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
β22Updated 2 years ago
Alternatives and similar repositories for The-Storfield-Methodology:
Users that are interested in The-Storfield-Methodology are comparing it to the libraries listed below
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous toolsβ88Updated last year
- π©οΈ Collection of BloodHound queries for Azureβ60Updated 2 months ago
- Lifetime AMSI bypass.β35Updated 9 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.β38Updated last year
- β47Updated this week
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLabβ76Updated last month
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.β79Updated 6 months ago
- A Python POC for CRED1 over SOCKS5β144Updated 5 months ago
- Living off the land searches for explorer and sharepointβ59Updated 5 months ago
- Living Off the Foreign Land setup scriptsβ67Updated last month
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refleβ¦β112Updated 10 months ago
- BloodHound PowerShell clientβ51Updated 2 weeks ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to β¦β23Updated 2 months ago
- Tool to extract username and password of current user from PanGPA in plaintextβ83Updated 3 months ago
- Artifact monitoring that ensures fairplayβ75Updated 2 months ago
- Lateral Movementβ123Updated last year
- PowerShell Reverse Shellβ61Updated last year
- β49Updated 5 months ago
- β154Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.β36Updated 2 months ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failureβ¦β37Updated last month
- C2 Automation using Linodeβ80Updated 2 years ago
- Abuse Azure API permissions for red teamingβ61Updated 2 years ago
- Two in one, patch lifetime powershell console, no more etw and amsi!β84Updated 9 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop appsβ137Updated 8 months ago
- β71Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirectionβ31Updated last year
- Efflanrs - GUI for Snaffler Outputβ26Updated 6 months ago
- β51Updated last year
- Example code samples from our ScriptBlock Smuggling Blog postβ90Updated 9 months ago