layer8secure / The-Storfield-Methodology
A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
☆22Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for The-Storfield-Methodology
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆85Updated last year
- Automated exploitation of MSSQL servers at scale☆81Updated last week
- Parses Snaffler output file and generate beautified outputs.☆37Updated 2 months ago
- Living Off the Foreign Land setup scripts☆62Updated 2 weeks ago
- Lifetime AMSI bypass.☆36Updated 4 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆63Updated this week
- ☆142Updated 8 months ago
- A Python POC for CRED1 over SOCKS5☆130Updated last month
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆36Updated 7 months ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆31Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆82Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆126Updated last week
- Living off the land searches for explorer and sharepoint☆49Updated last week
- BloodHound PowerShell client☆44Updated 3 weeks ago
- PowerShell Reverse Shell☆61Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆76Updated last month
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆70Updated last week
- ☆112Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆75Updated 6 months ago
- Lateral Movement☆118Updated 11 months ago
- ☆33Updated 3 weeks ago
- ☆51Updated 9 months ago
- ☆43Updated 4 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆57Updated 2 months ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆139Updated last year
- Microsoft Graph API post-exploitation toolkit☆93Updated 3 months ago
- Efflanrs - GUI for Snaffler Output☆20Updated last month
- Some scripts to support with importing large datasets into BloodHound☆76Updated 11 months ago