SixGenInc / break-free
Escaping Restricted Environments and Bypassing DLP
☆69Updated 6 years ago
Alternatives and similar repositories for break-free:
Users that are interested in break-free are comparing it to the libraries listed below
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆64Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆84Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆91Updated 3 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Updated 2 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆80Updated 3 years ago
- This code was used for the blogpost on secjuice.☆42Updated 5 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆85Updated 2 years ago
- An Ansible role for installing Cobalt Strike.☆76Updated last week
- An Insider Threat Toolkit☆149Updated 6 years ago
- ☆68Updated 4 years ago
- ☆162Updated 2 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆60Updated 6 years ago
- ☆51Updated 6 years ago
- Harvis is designed to automate your C2 Infrastructure.☆105Updated 2 years ago
- ☆128Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Self-healing RAT utilizing libp2p☆86Updated 4 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- A web shell for pivoting and lateral movement☆33Updated 7 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆60Updated 4 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated this week
- ☆92Updated 2 years ago
- ☆39Updated 6 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆84Updated last year
- Checks for signature requirements over LDAP☆97Updated 2 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Rewriting SIET to python3☆47Updated 5 months ago
- juicypotato for win10 > 1803 & win server 2019☆96Updated 4 years ago
- ☆35Updated 3 years ago