Name: Florian Hansemann
Type: User
Company: @HanseSecure
Bio: Father, Hacker, Consultant, Pentester, Researcher, Student, Exploits, OffsecDev, InfoSec & CyberCyber - https://hansesecure.de/impressum/
Twitter: CyberWarship
Location: Germany
Blog: https://hansesecure.de
Florian Hansemann 's Projects
TCP tunneling over HTTP/HTTPS for web application servers
A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service.
Microsoft signed ActiveDirectory PowerShell module
Adversary Tactics - PowerShell Training
This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with the AWAE course. This repo will likely contain custom code by me and various courses.
collect for learning cases
Six Degrees of Domain Admin
Some tests with the bloodhound community api
Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands on training!
Fileless web browser information extraction
dev level ;-)
Network Analysis Tool
Checking the HTTP response Codes of robots.txt entries
Converts the output from Invoke-Kerberoast into hashcat format.
Still in dev mode
Extract stored credentials from Internet Explorer and Edge
Win32k Elevation of Privilege Poc
PoC code for CVE-2019-0841 Privilege Escalation vulnerability
CVE-2019-2107
cve-2020-0688
CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
PoC for Zerologon - all research credits go to Tom Tervoort of Secura
Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)
CVE-2021-1732 Exploit
CVE-2021-40444 PoC
win32k LPE