layer8secure / The-Storfield-Methodology
A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
☆22Updated 2 years ago
Alternatives and similar repositories for The-Storfield-Methodology:
Users that are interested in The-Storfield-Methodology are comparing it to the libraries listed below
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆90Updated last year
- A Python POC for CRED1 over SOCKS5☆139Updated 3 months ago
- Lifetime AMSI bypass.☆35Updated 7 months ago
- Parses Snaffler output file and generate beautified outputs.☆66Updated this week
- Custom queries list for BloodHound☆23Updated 5 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆80Updated last month
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆108Updated 8 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆26Updated last year
- ☆145Updated 11 months ago
- Living Off the Foreign Land setup scripts☆64Updated 3 weeks ago
- Automated exploitation of MSSQL servers at scale☆104Updated this week
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆86Updated last year
- Living off the land searches for explorer and sharepoint☆54Updated 3 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆36Updated 10 months ago
- Microsoft Graph API post-exploitation toolkit☆93Updated 6 months ago
- ☆48Updated 3 months ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆37Updated 2 years ago
- Example code samples from our ScriptBlock Smuggling Blog post☆87Updated 7 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆66Updated 4 months ago
- pysnaffler☆88Updated 3 weeks ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆79Updated 4 months ago
- BloodHound PowerShell client☆49Updated this week
- ☆70Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆103Updated 9 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆106Updated 2 months ago
- Lateral Movement☆122Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆19Updated 2 weeks ago
- Abuse Azure API permissions for red teaming☆61Updated 2 years ago
- using graph proxy to monitor teams user presence☆52Updated 7 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆76Updated 2 months ago