Pinned Repositories
ADCSPwn
A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service.
advul
ad vulnerability scanner
Altered-Security-Notes
Notes from courses offered by Altered Security
Bad-Pdf
Steal Net-NTLM Hash using Bad-PDF
BestEdrOfTheMarket
Little AV/EDR bypassing lab for training & learning purposes
Certify
Active Directory certificate abuse.
Certipy
Tool for Active Directory Certificate Services enumeration and abuse
CoercedPotato
CRTE-Notes
Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.
gitlab-SSRF-redis-RCE
GitLab 11.4.7 SSRF配合redis远程执行代码
BreachAssume's Repositories
BreachAssume/advul
ad vulnerability scanner
BreachAssume/Altered-Security-Notes
Notes from courses offered by Altered Security
BreachAssume/BestEdrOfTheMarket
Little AV/EDR bypassing lab for training & learning purposes
BreachAssume/Certipy
Tool for Active Directory Certificate Services enumeration and abuse
BreachAssume/CoercedPotato
BreachAssume/CS-Situational-Awareness-BOF
Situational Awareness commands implemented using Beacon Object Files
BreachAssume/CVE-2023-42793
JetBrains TeamCity Authentication Bypass CVE-2023-42793 Exploit
BreachAssume/Cybersecurity-Interview-Guide
网安面试 网络安全面试 2023最新校招指南
BreachAssume/Detect-It-Easy
Program for determining types of files for Windows, Linux and MacOS.
BreachAssume/EvilSln
A New Exploitation Technique for Visual Studio Projects
BreachAssume/GhostDriver
yet another AV killer tool using BYOVD
BreachAssume/godap
A complete TUI for LDAP written in Golang.
BreachAssume/gost
GO Simple Tunnel - a simple tunnel written in golang
BreachAssume/jar-analyzer
Jar Analyzer - 一个JAR包分析工具,批量分析搜索,方法调用关系搜索,字符串搜索,Spring分析,CFG分析,JVM Stack Frame分析等众多功能
BreachAssume/LoaderGo
LoaderGo-快速生成免杀木马GUI版本,bypass主流杀软
BreachAssume/MultiDump
MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.
BreachAssume/OperatorsKit
Collection of Beacon Object Files (BOF) for Cobalt Strike
BreachAssume/OSCE3-Notes
BreachAssume/PoshC2
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
BreachAssume/PPLFault
BreachAssume/PSBits
Simple (relatively) things allowing you to dig a bit deeper than usual.
BreachAssume/RealBlindingEDR
Remove AV/EDR Kernel ObRegisterCallbacks、CmRegisterCallback、MiniFilter Callback、PsSetCreateProcessNotifyRoutine Callback、PsSetCreateThreadNotifyRoutine Callback、PsSetLoadImageNotifyRoutine Callback...
BreachAssume/Red-Team-Field-Manual
BreachAssume/setup-ipsec-vpn
Scripts to build your own IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2
BreachAssume/SqlmapXPlus
SqlmapXPlus 基于 Sqlmap,对经典的数据库漏洞利用工具进行二开!
BreachAssume/Stowaway
👻Stowaway -- Multi-hop Proxy Tool for pentesters
BreachAssume/useful_random_stuff
Just some things that have some cool uses
BreachAssume/vxlang-page
protector & obfuscator & code virtualizer
BreachAssume/WechatBakTool
基于C#的微信PC版聊天记录备份工具,提供图形界面,解密微信数据库并导出聊天记录。
BreachAssume/windows-defender-remover
A tool which is uses to remove Windows Defender in Windows 8.x, Windows 10 (every version) and Windows 11.