layer8secure / The-Storfield-MethodologyLinks
A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
☆22Updated 3 years ago
Alternatives and similar repositories for The-Storfield-Methodology
Users that are interested in The-Storfield-Methodology are comparing it to the libraries listed below
Sorting:
- ☆83Updated last month
- Malware As A Service☆135Updated last year
- Living off the land searches for explorer and sharepoint☆90Updated 4 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆95Updated 2 years ago
- Custom queries list for BloodHound☆29Updated 2 months ago
- Your Skyfall Infrastructure Pack☆76Updated last month
- AAD related enumeration in Nim☆131Updated 2 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆86Updated last month
- Artifact monitoring that ensures fairplay☆78Updated 7 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆131Updated last month
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆129Updated last month
- Fast context enumeration for newly obtained Active Directory credentials.☆64Updated 2 weeks ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- A Python POC for CRED1 over SOCKS5☆157Updated 11 months ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆171Updated 3 weeks ago
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆71Updated 5 months ago
- Cortex XDR Config Extractor☆133Updated 2 years ago
- Tool to extract username and password of current user from PanGPA in plaintext☆87Updated 8 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- pysnaffler☆102Updated 3 weeks ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 9 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆95Updated 2 years ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆116Updated last year
- ☆119Updated 5 months ago
- Decrypt GlobalProtect configuration and cookie files.☆150Updated last year
- ☆106Updated last year
- Python utility that generates "imageless" QR codes in various formats☆127Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆32Updated 8 months ago