Red Blue Team – Telegram
Red Blue Team
5.16K subscribers
38 photos
5 videos
33 files
1.43K links
-> 20 June 2019

]-> RedTeam | BlueTeam | Pentest

[-> Blue Team @BlueTeamKit
Download Telegram
#Threat_Research
1. Unauthenticated RCE against CommVault Command Center
https://srcincite.io/blog/2021/11/22/unlocking-the-vault.html
]-> PoC: https://srcincite.io/pocs/cve-2021-%7B34993,34996%7D.py.txt
2. A review of Microsoft Azure Sphere vulnerabilities
https://blog.talosintelligence.com/2021/11/a-review-of-azure-sphere.html?m=1
3. Exploiting the Qualcomm NPU (neural processing unit) kernel driver (CVE-2021-1940, CVE-2021-1968, CVE-2021-1969)
https://securitylab.github.com/research/qualcomm_npu

@BlueRedTeam
منابع تست نفوذ شبکه و امنیت شبکه :

@NetPentester


Network penetration testing resources and network security :

@NetPentesters
#RedTeam
Download Linux & Windows Binaries/Scripts used for Red Teaming & Pentesting

https://github.com/mashm3ll0w/pentest-tool
@BlueRedTeam
Pentester Reference :

@PentesterReference

Network penetration testing resources :

@NetPentesters
CVE-2021
Local PoC exploit for CVE-2021-43267 (Linux TIPC)

https://github.com/ohnonoyesyes/CVE-2021-43267
@BlueRedTeam
CVE-2021
CVE-2021-41773 Test Page & Exploit Code

https://github.com/jhye0n/CVE-2021-41773

@BlueRedTeam
MAL_CL_MindMap.png
2.7 MB
#Infographics
#BlueTeam
MAL-CL (Malicious Command-Line) MindMap
https://github.com/3CORESec/MAL-CL
// aims to collect and document real world and most common "malicious" command-line executions of different tools and utilities

@BlueRedTeam
#Threat_Research
In-depth analysis of Windows domain name resolution protection mechanism
https://mp.weixin.qq.com/s/MBWv5I-5DNoOrmEGP4kR0A

@BlueRedTeam
#Linux #Windows #privilege
Privilege Escalation Techniques: Learn the art of exploiting Windows and Linux systems.


Shere and Support us
T.me/C2Book_News
T.me/Library_Sec