layer8secure / The-Storfield-MethodologyLinks
A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
☆22Updated 3 years ago
Alternatives and similar repositories for The-Storfield-Methodology
Users that are interested in The-Storfield-Methodology are comparing it to the libraries listed below
Sorting:
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆91Updated 5 months ago
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆49Updated 3 months ago
- Malware As A Service☆135Updated last year
- Living off the land searches for explorer and sharepoint☆92Updated last month
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 5 months ago
- ☆102Updated last month
- Artifact monitoring that ensures fairplay☆78Updated 11 months ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆96Updated 2 years ago
- ☆120Updated 9 months ago
- ☆47Updated last year
- ☆25Updated 2 years ago
- Custom queries list for BloodHound☆31Updated 5 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- A Python POC for CRED1 over SOCKS5☆162Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆144Updated last year
- Tool to extract username and password of current user from PanGPA in plaintext☆88Updated last year
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆35Updated 10 months ago
- Some scripts to support with importing large datasets into BloodHound☆81Updated 2 years ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆78Updated 9 months ago
- AAD related enumeration in Nim☆133Updated 2 years ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- Abuse Azure API permissions for red teaming☆69Updated 2 years ago
- PowerShell Reverse Shell☆79Updated 2 years ago
- Microsoft Graph API post-exploitation toolkit☆95Updated last year
- A small script that automates Entra ID persistence with Windows Hello For Business key☆65Updated 10 months ago
- pysnaffler☆108Updated 4 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago