A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
☆22Aug 13, 2022Updated 3 years ago
Alternatives and similar repositories for The-Storfield-Methodology
Users that are interested in The-Storfield-Methodology are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DefCon Red Team Village 2023 Workshop on DLL Sideloading☆19Aug 15, 2023Updated 2 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- ☆40Nov 25, 2025Updated 5 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- A python polymorphic engine for C programs☆11Dec 8, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A python library to create BloodHound OpenGraphs☆61Feb 4, 2026Updated 3 months ago
- Simple HTTP async comms using standard GET/POST requests☆49Feb 5, 2026Updated 3 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Jul 15, 2022Updated 3 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- Rerousces related to time-travel debugging (TTD)☆41Jan 6, 2026Updated 4 months ago
- Yet another obfuscated payload generator written in Rust!☆13Feb 9, 2023Updated 3 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆501Jan 23, 2023Updated 3 years ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated 3 months ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆133Nov 5, 2024Updated last year
- TypeScript/JavaScript client libraries for Sliver☆27Apr 17, 2026Updated 3 weeks ago
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- A simple Python script to do quick, targeted recon of a given domain.☆76Apr 17, 2025Updated last year
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- ☆155Mar 5, 2026Updated 2 months ago
- ☆26Mar 24, 2026Updated last month
- ☆52Mar 30, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 对原版JNDIExploit进行修改增加线程和JMX注入内存马☆17Apr 23, 2025Updated last year
- FunctionID databases for Ghidra to recover function symbols with from stripped binaries☆15Jun 19, 2024Updated last year
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- 移动端渗透测试☆13Aug 7, 2022Updated 3 years ago
- webshell编码工具 支持 jsp net php asp编码免杀☆28Dec 16, 2025Updated 4 months ago
- Ludus range for the Constructing Defense Lab☆120Apr 21, 2026Updated 2 weeks ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆18Mar 24, 2025Updated last year
- Copy Breadcrumbs plugin for Visual Studio Code. Based on Scott Blair's extension.☆12Feb 3, 2025Updated last year
- Repository for Ludus french templates☆24Mar 1, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Encrypt any C# binary or bin file☆12Aug 1, 2024Updated last year
- ☆39Mar 28, 2025Updated last year
- CVE-2021-40438 exploit PoC with Docker setup.☆12Oct 24, 2021Updated 4 years ago
- A Mythic Agent written in PIC C.☆204Feb 4, 2025Updated last year
- A Mythic agent for Windows written in C☆162Updated this week
- A red team emulation tool deveoped by CyCraft Technology☆25Apr 18, 2024Updated 2 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago