layer8secure / The-Storfield-MethodologyLinks
A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
☆22Updated 3 years ago
Alternatives and similar repositories for The-Storfield-Methodology
Users that are interested in The-Storfield-Methodology are comparing it to the libraries listed below
Sorting:
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆86Updated last month
- Artifact monitoring that ensures fairplay☆78Updated 6 months ago
- Living off the land searches for explorer and sharepoint☆89Updated 3 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago
- ☆79Updated 3 weeks ago
- Your Skyfall Infrastructure Pack☆76Updated last week
- CaptainCredz is a modular and discreet password-spraying tool.☆123Updated last month
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆42Updated 7 months ago
- Custom queries list for BloodHound☆29Updated last month
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆70Updated 4 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 8 months ago
- ☆160Updated last year
- BloodHound PowerShell client☆58Updated last week
- ☆46Updated last year
- Malware As A Service☆135Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year
- ☆119Updated 4 months ago
- Cortex XDR Config Extractor☆133Updated 2 years ago
- C2 Automation using Linode☆83Updated 2 years ago
- Tool to extract username and password of current user from PanGPA in plaintext☆87Updated 8 months ago
- Microsoft Graph API post-exploitation toolkit☆94Updated last year
- Payload Generation Workflow☆40Updated last month
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆77Updated last week
- AAD related enumeration in Nim☆131Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆32Updated 7 months ago
- A Python POC for CRED1 over SOCKS5☆154Updated 10 months ago
- PowerShell Reverse Shell☆78Updated 2 years ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆42Updated last month