A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
☆22Aug 13, 2022Updated 3 years ago
Alternatives and similar repositories for The-Storfield-Methodology
Users that are interested in The-Storfield-Methodology are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DefCon Red Team Village 2023 Workshop on DLL Sideloading☆19Aug 15, 2023Updated 2 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- ☆39Nov 25, 2025Updated 4 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- ☆26Jun 2, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A python library to create BloodHound OpenGraphs☆56Feb 4, 2026Updated last month
- Simple HTTP async comms using standard GET/POST requests☆49Feb 5, 2026Updated last month
- ☆11Jun 9, 2020Updated 5 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Jul 15, 2022Updated 3 years ago
- Rerousces related to time-travel debugging (TTD)☆36Jan 6, 2026Updated 2 months ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- Yet another obfuscated payload generator written in Rust!☆13Feb 9, 2023Updated 3 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆501Jan 23, 2023Updated 3 years ago
- A simple Python script to do quick, targeted recon of a given domain.☆72Apr 17, 2025Updated 11 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated 2 months ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆131Nov 5, 2024Updated last year
- TypeScript/JavaScript client libraries for Sliver☆25Mar 15, 2026Updated 2 weeks ago
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- ☆155Mar 5, 2026Updated 3 weeks ago
- Ludus range for the Constructing Defense Lab☆113Feb 23, 2026Updated last month
- ☆26Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆53Sep 23, 2025Updated 6 months ago
- 对原版JNDIExploit进行修改增加线程和JMX注入内存马☆17Apr 23, 2025Updated 11 months ago
- FunctionID databases for Ghidra to recover function symbols with from stripped binaries☆15Jun 19, 2024Updated last year
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- 移动端渗透测试☆13Aug 7, 2022Updated 3 years ago
- webshell编码工具 支持 jsp net php asp编码免杀☆28Dec 16, 2025Updated 3 months ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆18Mar 24, 2025Updated last year
- Repository for Ludus french templates☆23Mar 1, 2026Updated 3 weeks ago
- Encrypt any C# binary or bin file☆12Aug 1, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆38Mar 28, 2025Updated last year
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- CVE-2021-40438 exploit PoC with Docker setup.☆12Oct 24, 2021Updated 4 years ago
- A Mythic agent for Windows written in C☆163Updated this week
- Data Scientists Go To Jupyter☆68Mar 3, 2025Updated last year
- A red team emulation tool deveoped by CyCraft Technology☆25Apr 18, 2024Updated last year
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago