A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
☆22Aug 13, 2022Updated 3 years ago
Alternatives and similar repositories for The-Storfield-Methodology
Users that are interested in The-Storfield-Methodology are comparing it to the libraries listed below
Sorting:
- A python library to create BloodHound OpenGraphs☆53Feb 4, 2026Updated last month
- DefCon Red Team Village 2023 Workshop on DLL Sideloading☆19Aug 15, 2023Updated 2 years ago
- A simple Python script to do quick, targeted recon of a given domain.☆70Apr 17, 2025Updated 10 months ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- ☆39Nov 25, 2025Updated 3 months ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- ☆38Mar 28, 2025Updated 11 months ago
- A powerful, easy to use and intuitive way to create network analysis charts☆15Updated this week
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- General purpose attack-defense range for zero-config deployment☆44Nov 20, 2025Updated 3 months ago
- Yet Another LinkedIn Scraper☆33Mar 9, 2023Updated 2 years ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆40Feb 17, 2026Updated 2 weeks ago
- Simple HTTP async comms using standard GET/POST requests☆47Feb 5, 2026Updated last month
- ☆154Mar 26, 2025Updated 11 months ago
- Updated version of n0kovo's Rule List☆44Jan 29, 2026Updated last month
- Validates priv escalation of AD trusts☆47Apr 1, 2025Updated 11 months ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- Ludus range for the Constructing Defense Lab☆106Feb 23, 2026Updated last week
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- webshell编码工具 支持 jsp net php asp编码免杀☆27Dec 16, 2025Updated 2 months ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Diskmag engine Deus ex Machina (DOS, Windows, smooth scrolling from CGA to SVGA)☆13Nov 11, 2015Updated 10 years ago
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- Encrypt any C# binary or bin file☆12Aug 1, 2024Updated last year
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- ☆16Dec 7, 2025Updated 3 months ago
- 对原版JNDIExploit进行修改增加线程和JMX注入内存马☆17Apr 23, 2025Updated 10 months ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago