A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
☆22Aug 13, 2022Updated 3 years ago
Alternatives and similar repositories for The-Storfield-Methodology
Users that are interested in The-Storfield-Methodology are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DefCon Red Team Village 2023 Workshop on DLL Sideloading☆19Aug 15, 2023Updated 2 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- ☆40Nov 25, 2025Updated 4 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- A python polymorphic engine for C programs☆11Dec 8, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆26Jun 2, 2022Updated 3 years ago
- A python library to create BloodHound OpenGraphs☆59Feb 4, 2026Updated 2 months ago
- Simple HTTP async comms using standard GET/POST requests☆49Feb 5, 2026Updated 2 months ago
- ☆11Jun 9, 2020Updated 5 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Jul 15, 2022Updated 3 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- Yet another obfuscated payload generator written in Rust!☆13Feb 9, 2023Updated 3 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆501Jan 23, 2023Updated 3 years ago
- A simple Python script to do quick, targeted recon of a given domain.☆72Apr 17, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated 3 months ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆132Nov 5, 2024Updated last year
- TypeScript/JavaScript client libraries for Sliver☆25Mar 27, 2026Updated 3 weeks ago
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- ☆155Mar 5, 2026Updated last month
- ☆26Mar 24, 2026Updated 3 weeks ago
- ☆52Mar 30, 2026Updated 2 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 对原版JNDIExploit进行修改增加线程和JMX注入内存马☆17Apr 23, 2025Updated 11 months ago
- Ludus range for the Constructing Defense Lab☆118Apr 5, 2026Updated last week
- FunctionID databases for Ghidra to recover function symbols with from stripped binaries☆15Jun 19, 2024Updated last year
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- 移动端渗透测试☆13Aug 7, 2022Updated 3 years ago
- Jsfuck decryption implemented by pure Python code☆16Jul 22, 2019Updated 6 years ago
- webshell编码工具 支持 jsp net php asp编码免杀☆28Dec 16, 2025Updated 4 months ago
- Copy Breadcrumbs plugin for Visual Studio Code. Based on Scott Blair's extension.☆12Feb 3, 2025Updated last year
- Repository for Ludus french templates☆23Mar 1, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Encrypt any C# binary or bin file☆12Aug 1, 2024Updated last year
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- ☆38Mar 28, 2025Updated last year
- CVE-2021-40438 exploit PoC with Docker setup.☆12Oct 24, 2021Updated 4 years ago
- A Mythic Agent written in PIC C.☆203Feb 4, 2025Updated last year
- A Mythic agent for Windows written in C☆160Apr 9, 2026Updated last week
- burpsuit插件,解析swagger/openapi接口文档并进行请求,模拟参数方便渗透测试人员快速发现可用接口 (最新使用源码编译,release有时候没空搞)☆42Oct 23, 2025Updated 5 months ago