layer8secure / The-Storfield-MethodologyLinks
A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
☆22Updated 2 years ago
Alternatives and similar repositories for The-Storfield-Methodology
Users that are interested in The-Storfield-Methodology are comparing it to the libraries listed below
Sorting:
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆39Updated last year
- Lifetime AMSI bypass.☆35Updated 2 months ago
- Your Skyfall Infrastructure Pack☆76Updated last month
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆32Updated 3 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- An Ansible collection that installs an ADFS deployment with optional configurations.☆39Updated 6 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆30Updated 5 months ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆40Updated 4 months ago
- tool for requesting Entra ID's P2P certificate and authenticating remote Entra joinned devices with it☆70Updated last week
- Microsoft Graph API post-exploitation toolkit☆94Updated 11 months ago
- A community-driven collection of BloodHound queries☆53Updated last week
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆75Updated last week
- Custom queries list for BloodHound☆28Updated 10 months ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆47Updated 3 months ago
- Scripts that automate portions of pentests.☆51Updated last month
- Lateral Movement☆124Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆36Updated last year
- Efflanrs - GUI for Snaffler Output☆26Updated 9 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆85Updated 3 weeks ago
- Living off the land searches for explorer and sharepoint☆87Updated 2 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆45Updated last week
- ☆50Updated 7 months ago
- ☆44Updated 11 months ago
- ☆61Updated 5 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆38Updated 5 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 9 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Tool to extract username and password of current user from PanGPA in plaintext☆85Updated 6 months ago