Name: Jason Adsit
Type: User
Company: @oregon-eso-cyber-assessments
Bio: I'm currently a Cybersecurity Assessor working in the public sector. Feel free to contact me. I'm on most networks as CipherScruples or glitch.
Stay geeky.
Location: Salem, Oregon, USA
Blog: https://jasonadsit.github.io
Jason Adsit's Projects
Powershell script to do domain auditing automation
A toolset to make a system look as if it was the victim of an APT attack
A collection of various awesome lists for hackers, pentesters and security researchers
A collection of awesome penetration testing resources, tools and other shiny things
A curated list of delightful PowerShell modules and resources
List of Awesome Red Teaming Resources
BadBlood by Secframe fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Scripts and resources for Red Teaming at CCDC competitions
Controls Assessment Specification
Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers.
Notes, videos, and stuff.
CVE-2021-40444 Sample
Internet Datamining
Find vulnerabilities in AD Group Policy
Extending and consolidating hosts files from several well-curated sources like adaway.org, mvps.org, malwaredomainlist.com, someonewhocares.org, and potentially others. You can optionally invoke extensions to block additional sites by category.
A collection of hunting and blue team scripts. Mostly others, some my own.
The unified ICAS ontology designed to describe information-security related information
Provides In-memory compilation and reflective loading of C# apps for AV evasion.
An Information Security Reference That Doesn't Suck
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
Forward local or remote tcp ports through SMB pipes.
PowerShell Pass The Hash Utils
Collection of IronPython scripts and executables for penetration testing
Code for my website
Deployment and maintenance tool for Cyber Ranges. Core components are salt, openstack, and ceph.
Backing store for reference documents.