#Blue_Team
1. This tool reveals hidden desktops and investigate processes/threads utilizing hidden desktops
https://github.com/AgigoNoTana/HiddenDesktopViewer
2. Analysis of Log4jShell Attack
https://www.goggleheadedhacker.com/blog/post/log4jshell-analysis
@BlueRedTeam
1. This tool reveals hidden desktops and investigate processes/threads utilizing hidden desktops
https://github.com/AgigoNoTana/HiddenDesktopViewer
2. Analysis of Log4jShell Attack
https://www.goggleheadedhacker.com/blog/post/log4jshell-analysis
@BlueRedTeam
GitHub
GitHub - AgigoNoTana/HiddenDesktopViewer: This tool reveals hidden desktops and investigate processes/threads utilizing hidden…
This tool reveals hidden desktops and investigate processes/threads utilizing hidden desktops - AgigoNoTana/HiddenDesktopViewer
#Log4j
Examining Log4j Vulnerabilities in Connected Cars
and Charging Stations
https://www.trendmicro.com/en_us/research/21/l/examining-log4j-vulnerabilities-in-connected-cars.html
@BlueRedTeam
Examining Log4j Vulnerabilities in Connected Cars
and Charging Stations
https://www.trendmicro.com/en_us/research/21/l/examining-log4j-vulnerabilities-in-connected-cars.html
@BlueRedTeam
Trend Micro
Examining Log4j Vulnerabilities in Connected Cars and Charging Stations
In this entry we look into how Log4j vulnerabilities affect devices or properties embedded in or used for connected cars, specifically chargers, in-vehicle infotainment systems, and digital remotes for opening cars.
#Red_Team
1. Path traversal in Grafana 8.x allows UnAuth arbitrary local file read
https://hackerone.com/reports/1415820
2. Flickr Account Takeover
https://security.lauritz-holtmann.de/advisories/flickr-account-takeover
@BlueRedTeam
1. Path traversal in Grafana 8.x allows UnAuth arbitrary local file read
https://hackerone.com/reports/1415820
2. Flickr Account Takeover
https://security.lauritz-holtmann.de/advisories/flickr-account-takeover
@BlueRedTeam
HackerOne
Aiven Ltd disclosed on HackerOne: Zero day path traversal...
## Summary:
Hi team,
I've found a path traversal issue in the Grafana instances hosted on the Aiven platforms. With the path traversal it's possible for an unauthenticated user to read arbitrary...
Hi team,
I've found a path traversal issue in the Grafana instances hosted on the Aiven platforms. With the path traversal it's possible for an unauthenticated user to read arbitrary...
#Blue_Team
#Log4j
How to exploit Log4j vulnerabilities in VMWare vCenter
https://www.sprocketsecurity.com/blog/how-to-exploit-log4j-vulnerabilities-in-vmware-vcenter
@BlueRedTeam
#Log4j
How to exploit Log4j vulnerabilities in VMWare vCenter
https://www.sprocketsecurity.com/blog/how-to-exploit-log4j-vulnerabilities-in-vmware-vcenter
@BlueRedTeam
Sprocket Security
How to exploit Log4j vulnerabilities in VMWare vCenter
A vulnerability was recently disclosed for the Java logging library, Log4j. The vulnerability is wide-reaching and affects both open source projects and enterprise software, meaning we need to understand how to ID and remediate it in our network environments.…
#Blue_Team
Zabbix vulnerability assessment plugin
https://github.com/vulnersCom/zabbix-threat-control
@BlueRedTeam
Zabbix vulnerability assessment plugin
https://github.com/vulnersCom/zabbix-threat-control
@BlueRedTeam
GitHub
GitHub - vulnersCom/zabbix-threat-control: Zabbix vulnerability assessment plugin
Zabbix vulnerability assessment plugin. Contribute to vulnersCom/zabbix-threat-control development by creating an account on GitHub.
#exploit
1. CVE 2020-14871:
Sun Solaris PoC Exploit
https://github.com/robidev/CVE-2020-14871-Exploit
2. CVE-2021-45105:
DoS via Uncontrolled Recursion in Log4j Strsubstitutor
https://www.zerodayinitiative.com/blog/2021/12/17/cve-2021-45105-denial-of-service-via-uncontrolled-recursion-in-log4j-strsubstitutor
@BlueRedTeam
1. CVE 2020-14871:
Sun Solaris PoC Exploit
https://github.com/robidev/CVE-2020-14871-Exploit
2. CVE-2021-45105:
DoS via Uncontrolled Recursion in Log4j Strsubstitutor
https://www.zerodayinitiative.com/blog/2021/12/17/cve-2021-45105-denial-of-service-via-uncontrolled-recursion-in-log4j-strsubstitutor
@BlueRedTeam
GitHub
GitHub - robidev/CVE-2020-14871-Exploit: This is a basic ROP based exploit for CVE 2020-14871. CVE 2020-14871 is a vulnerability…
This is a basic ROP based exploit for CVE 2020-14871. CVE 2020-14871 is a vulnerability in Sun Solaris systems libpam library, and exploitable over ssh - robidev/CVE-2020-14871-Exploit
#Blue_Team
Cache Poisoning at Scale:
Identifying and Exploiting over 70 Cache Poisoning vulnerabilities
https://youst.in/posts/cache-poisoning-at-scale
@BlueRedTeam
Cache Poisoning at Scale:
Identifying and Exploiting over 70 Cache Poisoning vulnerabilities
https://youst.in/posts/cache-poisoning-at-scale
@BlueRedTeam
#Red_Team
PHP LFI with Nginx Assistance
https://bierbaumer.net/security/php-lfi-with-nginx-assistance
@BlueRedTeam
PHP LFI with Nginx Assistance
https://bierbaumer.net/security/php-lfi-with-nginx-assistance
@BlueRedTeam
#Red_Team
Overlord - Red Teaming Infrastructure Automation
https://github.com/qsecure-labs/overlord
@BlueRedTeam
Overlord - Red Teaming Infrastructure Automation
https://github.com/qsecure-labs/overlord
@BlueRedTeam
GitHub
GitHub - qsecure-labs/overlord: Overlord - Red Teaming Infrastructure Automation
Overlord - Red Teaming Infrastructure Automation. Contribute to qsecure-labs/overlord development by creating an account on GitHub.
#Red_Team
1. Nim implementation of Process Hollowing using syscalls (PoC)
https://github.com/snovvcrash/NimHollow
2. Minimal Cobalt Strike C2 Profile for Bypassing Defender
https://gist.github.com/tothi/8abd2de8f4948af57aa2d027f9e59efe
@BlueRedTeam
1. Nim implementation of Process Hollowing using syscalls (PoC)
https://github.com/snovvcrash/NimHollow
2. Minimal Cobalt Strike C2 Profile for Bypassing Defender
https://gist.github.com/tothi/8abd2de8f4948af57aa2d027f9e59efe
@BlueRedTeam
#Blue_Team
1. WELA - Windows Event Log Analyzer
https://github.com/Yamato-Security/WELA
2. Tutorial: Lateral movement playbook
https://docs.microsoft.com/en-us/defender-for-identity/playbook-lateral-movement
@BlueRedTeam
1. WELA - Windows Event Log Analyzer
https://github.com/Yamato-Security/WELA
2. Tutorial: Lateral movement playbook
https://docs.microsoft.com/en-us/defender-for-identity/playbook-lateral-movement
@BlueRedTeam
GitHub
GitHub - Yamato-Security/WELA: Windows Event Log Auditor
Windows Event Log Auditor. Contribute to Yamato-Security/WELA development by creating an account on GitHub.
#exploit
1. CVE-2021-45232:
Apache apisix Dashboard api unauth RCE
https://github.com/shakeman8/CVE-2021-45232-RCE
https://github.com/badboycxcc/CVE-2021-45232-POC
2. CVE-2021-40859:
Auerswald COMpact 8.0B Backdoors exploit
https://github.com/dorkerdevil/CVE-2021-40859
https://github.com/419066074/CVE-2021-40859
3. Winning the Impossible Race -
An Unintended Solution for Includer’s Revenge
https://lewin.co.il/winning-the-impossible-race-an-unintended-solution-for-includers-revenge-counter-hxp-2021
@BlueRedTeam
1. CVE-2021-45232:
Apache apisix Dashboard api unauth RCE
https://github.com/shakeman8/CVE-2021-45232-RCE
https://github.com/badboycxcc/CVE-2021-45232-POC
2. CVE-2021-40859:
Auerswald COMpact 8.0B Backdoors exploit
https://github.com/dorkerdevil/CVE-2021-40859
https://github.com/419066074/CVE-2021-40859
3. Winning the Impossible Race -
An Unintended Solution for Includer’s Revenge
https://lewin.co.il/winning-the-impossible-race-an-unintended-solution-for-includers-revenge-counter-hxp-2021
@BlueRedTeam
#Threat_Research
#log4Shell
The attack on ONUS -
A real-life case of the Log4Shell vulnerability
https://cystack.net/research/the-attack-on-onus-a-real-life-case-of-the-log4shell-vulnerability
@BlueRedTeam
#log4Shell
The attack on ONUS -
A real-life case of the Log4Shell vulnerability
https://cystack.net/research/the-attack-on-onus-a-real-life-case-of-the-log4shell-vulnerability
@BlueRedTeam
cystack.net
The attack on ONUS – A real-life case of the Log4Shell vulnerability
Reading Time: 6 minutesĐọc bản tiếng Việt tại đây Log4Shell has recently been a nightmare (probably the worst one for now) to businesses. ONUS, a client of ours, was an unfortunate victim. As their security partner, CyStack informed ONUS of the risks right…
#Red_Team
A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Red Team in Cybersecurity.
https://github.com/paulveillard/cybersecurity-red-team
@BlueRedTeam
A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Red Team in Cybersecurity.
https://github.com/paulveillard/cybersecurity-red-team
@BlueRedTeam
GitHub
GitHub - paulveillard/cybersecurity-red-team: An ongoing & curated collection of awesome software best practices and techniques…
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technica...
#Red_Team
1. WAF/IPS/DLP bypass Cheat Sheet
https://github.com/Bo0oM/WAF-bypass-Cheat-Sheet
2. A flexible tool for redirecting a given program's TCP traffic to SOCKS5/HTTP proxy
https://github.com/hmgle/graftcp
@BlueRedTeam
1. WAF/IPS/DLP bypass Cheat Sheet
https://github.com/Bo0oM/WAF-bypass-Cheat-Sheet
2. A flexible tool for redirecting a given program's TCP traffic to SOCKS5/HTTP proxy
https://github.com/hmgle/graftcp
@BlueRedTeam
GitHub
GitHub - Bo0oM/WAF-bypass-Cheat-Sheet: Another way to bypass WAF Cheat Sheet (draft)
Another way to bypass WAF Cheat Sheet (draft). Contribute to Bo0oM/WAF-bypass-Cheat-Sheet development by creating an account on GitHub.
#exploit
Jnoscript9 Remote Code Execution Exploit
https://github.com/badd1e/Pwn/tree/main/jnoscript9-RCE
// Full PoC exploit for a JIT Type Confusion vulnerability
in Microsoft JavaScript engine (Jnoscript9.dll)
]-> https://zerodayengineering.com/research/javanoscript-engines-exploitation-jnoscript9.html
@BlueRedTeam
Jnoscript9 Remote Code Execution Exploit
https://github.com/badd1e/Pwn/tree/main/jnoscript9-RCE
// Full PoC exploit for a JIT Type Confusion vulnerability
in Microsoft JavaScript engine (Jnoscript9.dll)
]-> https://zerodayengineering.com/research/javanoscript-engines-exploitation-jnoscript9.html
@BlueRedTeam
GitHub
Pwn/jnoscript9-RCE at main · badd1e/Pwn
Advanced exploits that I wrote for Pwn2Own competitions and other occasions - badd1e/Pwn
❤1👍1
Forwarded from Network Penetration Testing
Active Directory Red Team Tools
https://github.com/nobelh/ActiveDirectory
#AD
#RedTeam
#Tools
@NetPentesters
https://github.com/nobelh/ActiveDirectory
#AD
#RedTeam
#Tools
@NetPentesters
GitHub
GitHub - nobelh/ActiveDirectory: Active Directory Red Team Tools
Active Directory Red Team Tools. Contribute to nobelh/ActiveDirectory development by creating an account on GitHub.
👍2🔥1
#Blue_Team
1. A log4j vulnerability filesystem scanner and Go package for analyzing JAR files
https://github.com/google/log4jscanner
2. ISO 27001 Implementation Checklist
https://www.upguard.com/blog/iso-27001-implementation-checklist
@BlueRedTeam
1. A log4j vulnerability filesystem scanner and Go package for analyzing JAR files
https://github.com/google/log4jscanner
2. ISO 27001 Implementation Checklist
https://www.upguard.com/blog/iso-27001-implementation-checklist
@BlueRedTeam
GitHub
GitHub - google/log4jscanner: A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.
A log4j vulnerability filesystem scanner and Go package for analyzing JAR files. - google/log4jscanner
#exploit
#log4Shell
Exploiting CVE-2021-44228 using PDFs as delivery channel
https://github.com/eelyvy/log4jshell-pdf
@BlueRedTeam
#log4Shell
Exploiting CVE-2021-44228 using PDFs as delivery channel
https://github.com/eelyvy/log4jshell-pdf
@BlueRedTeam
GitHub
GitHub - eelyvy/log4jshell-pdf: The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities…
The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel - eelyvy/log4jshell-pdf
#Red_Team
Windows Process Listing Using WTS API
Part 1:
https://tbhaxor.com/windows-process-listing-using-wtsapi32
Part 2:
https://tbhaxor.com/windows-process-listing-using-wtsapi32-2
@BlueRedTeam
Windows Process Listing Using WTS API
Part 1:
https://tbhaxor.com/windows-process-listing-using-wtsapi32
Part 2:
https://tbhaxor.com/windows-process-listing-using-wtsapi32-2
@BlueRedTeam
tbhaxor's Blog
Windows Process Listing Using WTS API – Part 1
In this detailed walkthrough of process listing using WTS API, you will learn the importance of the process listing and enumeration of anti-malware agents and will get your hands dirty with the source code