Name: Yash Bharadwaj
Type: User
Company: cyberwarfarelabs
Bio: Yash Bharadwaj, Technical Architect at CyberWarFare R&D Pvt. Ltd.
Loves to work on offensive trade-crafts
Twitter: flopyash
Location: Bengaluru, Karnataka
Blog: https://cyberwarfare.live
Yash Bharadwaj's Projects
PowerShell Conference Europe 2018 Slides and Demo Scripts
:wrench: Deploy customizable Active Directory labs in Azure - automatically.
Adversarial Threat Matrix
Malware development for red teaming workshop
Alternative Shellcode Execution Via Callbacks
A collaborative, multi-platform, red teaming framework
A Catalog of Application Whitelisting Bypass Techniques
Adversary Tactics - PowerShell Training
Evading WinDefender ATP credential-theft
Simulate past supply chain attacks such as SolarWinds, Codecov, and ua-parser-js
Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.
A curated list of awesome threat detection and hunting resources
collect for learning cases
Welcome to the Azure Security Center community repository
Windows 权限提升 BadPotato
BetterSafetyKatz
Browser In The Browser (BITB) Templates
Demos for the Blackhat USA 2022 talk "Taking Kerberos to the Next Level"
BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET
Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands on training!
PowerShell Constrained Language Mode Bypass
A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux
EDR Evasion - Combination of SwampThing - TikiTorch
FUD win32 msfvenom payload generator
Minimal code to connect to a CEF debugger.