layer8secure / The-Storfield-Methodology
A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
☆22Updated 2 years ago
Alternatives and similar repositories for The-Storfield-Methodology:
Users that are interested in The-Storfield-Methodology are comparing it to the libraries listed below
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆25Updated 3 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- A Python POC for CRED1 over SOCKS5☆147Updated 6 months ago
- Living off the land searches for explorer and sharepoint☆78Updated 5 months ago
- Lifetime AMSI bypass.☆35Updated 9 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated 11 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆80Updated 7 months ago
- Scripts that automate portions of pentests.☆46Updated this week
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆37Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated 2 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆79Updated last week
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆37Updated 2 months ago
- PowerShell Reverse Shell☆61Updated last year
- ☆50Updated 5 months ago
- ☆56Updated 3 weeks ago
- Microsoft Graph API post-exploitation toolkit☆94Updated 9 months ago
- Your Skyfall Infrastructure Pack☆66Updated last week
- Deploy a phishing infrastructure on the fly.☆68Updated 3 months ago
- BloodHound PowerShell client☆51Updated last week
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 10 months ago
- 🌩️ Collection of BloodHound queries for Azure☆63Updated 3 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆31Updated last month
- Custom queries list for BloodHound☆23Updated 7 months ago
- Living Off the Foreign Land setup scripts☆67Updated last month
- ☆43Updated 9 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 10 months ago
- Lateral Movement☆122Updated last year
- ☆41Updated last week
- Abuse Azure API permissions for red teaming☆64Updated 2 years ago