SixGenInc / break-freeView external linksLinks
Escaping Restricted Environments and Bypassing DLP
☆77Jan 22, 2019Updated 7 years ago
Alternatives and similar repositories for break-free
Users that are interested in break-free are comparing it to the libraries listed below
Sorting:
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆153Dec 26, 2025Updated last month
- Mythic Scripting PyPi package - mythic☆28Oct 10, 2025Updated 4 months ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Zero-day vulnerabilities affecting Microsoft Exchange Server☆12Oct 4, 2022Updated 3 years ago
- ☆12Oct 10, 2024Updated last year
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Feb 21, 2023Updated 2 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.☆35Oct 28, 2025Updated 3 months ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆13Jul 16, 2025Updated 6 months ago
- ☆88Jul 28, 2022Updated 3 years ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- A sample bot for Cobalt Strike 3☆22Jun 11, 2016Updated 9 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- Self-healing RAT utilizing libp2p☆88Dec 27, 2020Updated 5 years ago
- Pre-Auth Exploit for CVE-2024-40711☆55Sep 15, 2024Updated last year
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Apr 13, 2025Updated 10 months ago
- ☆15Feb 9, 2022Updated 4 years ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆260Nov 22, 2025Updated 2 months ago
- Code Exec via Excel☆89Jul 31, 2017Updated 8 years ago
- [DEPRECATED, use specter instead] like ngrok, but ambitious☆36Apr 5, 2022Updated 3 years ago
- Switch to JuicyPotato! https://github.com/decoder-it/juicy-potato☆12Feb 8, 2020Updated 6 years ago
- Short Programs For Spreading Malware☆16Aug 11, 2021Updated 4 years ago
- ☆19Sep 17, 2025Updated 4 months ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆232Oct 4, 2020Updated 5 years ago
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Oct 8, 2024Updated last year
- ☆44Feb 6, 2025Updated last year
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- ☆40Dec 24, 2025Updated last month
- x64 version☆36Oct 8, 2021Updated 4 years ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆534May 9, 2025Updated 9 months ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆140Nov 4, 2020Updated 5 years ago
- all published scripts devloped by ahmed khlief☆20Apr 3, 2020Updated 5 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago