layer8secure / The-Storfield-MethodologyLinks
A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
☆22Updated 3 years ago
Alternatives and similar repositories for The-Storfield-Methodology
Users that are interested in The-Storfield-Methodology are comparing it to the libraries listed below
Sorting:
- Artifact monitoring that ensures fairplay☆79Updated last year
- Living off the land searches for explorer and sharepoint☆92Updated last month
- Your Skyfall Infrastructure Pack☆90Updated this week
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- ☆47Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆98Updated 2 years ago
- Malware As A Service☆137Updated last year
- ☆25Updated 3 years ago
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 6 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆92Updated 6 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆89Updated last year
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆96Updated 2 years ago
- Logging tool intended for red team usage☆35Updated last month
- Custom queries list for BloodHound☆31Updated 6 months ago
- A Python POC for CRED1 over SOCKS5☆162Updated last year
- Payload Generation Workflow☆40Updated 6 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆144Updated last year
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆79Updated 9 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆34Updated 2 months ago
- ☆101Updated 2 months ago
- Utilities for obfuscating shellcode☆98Updated 4 months ago
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆52Updated last week
- Red Team Collaboration Infrastructure☆98Updated 9 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆44Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- Microsoft Graph API post-exploitation toolkit☆95Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Updated 2 years ago