Escaping Restricted Environments and Bypassing DLP
☆79Jan 22, 2019Updated 7 years ago
Alternatives and similar repositories for break-free
Users that are interested in break-free are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 4 months ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- ☆46Feb 6, 2025Updated last year
- Mythic Scripting PyPi package - mythic☆30Oct 10, 2025Updated 6 months ago
- ☆12Oct 10, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- Self-healing RAT utilizing libp2p☆88Dec 27, 2020Updated 5 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.☆36Oct 28, 2025Updated 6 months ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Feb 21, 2023Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- ☆19Sep 17, 2025Updated 7 months ago
- ☆14Sep 26, 2023Updated 2 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆39Jan 3, 2020Updated 6 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Apr 2, 2026Updated last month
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- Acunetix - Vulnerability Scanner install + licensed (included docker version)☆13Jul 23, 2025Updated 9 months ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆232Oct 4, 2020Updated 5 years ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆63Apr 13, 2025Updated last year
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Oct 8, 2024Updated last year
- A self-hosted Armory implementation.☆24Jan 1, 2026Updated 4 months ago
- ☆90Jul 28, 2022Updated 3 years ago
- Zero-day vulnerabilities affecting Microsoft Exchange Server☆12Oct 4, 2022Updated 3 years ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆270Nov 22, 2025Updated 5 months ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- Code Exec via Excel☆89Jul 31, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- [DEPRECATED, use specter instead] like ngrok, but ambitious☆37Apr 5, 2022Updated 4 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- Useful OSINT tools for Discord☆24Jan 21, 2026Updated 3 months ago
- InsightVM PostgreSQL Reports, Queries, ETC.☆26Mar 24, 2023Updated 3 years ago
- Pre-Auth Exploit for CVE-2024-40711☆54Sep 15, 2024Updated last year
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆140Nov 4, 2020Updated 5 years ago