#exploit
1. CVE-2021-45232:
Apache apisix Dashboard api unauth RCE
https://github.com/shakeman8/CVE-2021-45232-RCE
https://github.com/badboycxcc/CVE-2021-45232-POC
2. CVE-2021-40859:
Auerswald COMpact 8.0B Backdoors exploit
https://github.com/dorkerdevil/CVE-2021-40859
https://github.com/419066074/CVE-2021-40859
3. Winning the Impossible Race -
An Unintended Solution for Includer’s Revenge
https://lewin.co.il/winning-the-impossible-race-an-unintended-solution-for-includers-revenge-counter-hxp-2021
@BlueRedTeam
1. CVE-2021-45232:
Apache apisix Dashboard api unauth RCE
https://github.com/shakeman8/CVE-2021-45232-RCE
https://github.com/badboycxcc/CVE-2021-45232-POC
2. CVE-2021-40859:
Auerswald COMpact 8.0B Backdoors exploit
https://github.com/dorkerdevil/CVE-2021-40859
https://github.com/419066074/CVE-2021-40859
3. Winning the Impossible Race -
An Unintended Solution for Includer’s Revenge
https://lewin.co.il/winning-the-impossible-race-an-unintended-solution-for-includers-revenge-counter-hxp-2021
@BlueRedTeam
#Threat_Research
#log4Shell
The attack on ONUS -
A real-life case of the Log4Shell vulnerability
https://cystack.net/research/the-attack-on-onus-a-real-life-case-of-the-log4shell-vulnerability
@BlueRedTeam
#log4Shell
The attack on ONUS -
A real-life case of the Log4Shell vulnerability
https://cystack.net/research/the-attack-on-onus-a-real-life-case-of-the-log4shell-vulnerability
@BlueRedTeam
cystack.net
The attack on ONUS – A real-life case of the Log4Shell vulnerability
Reading Time: 6 minutesĐọc bản tiếng Việt tại đây Log4Shell has recently been a nightmare (probably the worst one for now) to businesses. ONUS, a client of ours, was an unfortunate victim. As their security partner, CyStack informed ONUS of the risks right…
#Red_Team
A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Red Team in Cybersecurity.
https://github.com/paulveillard/cybersecurity-red-team
@BlueRedTeam
A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Red Team in Cybersecurity.
https://github.com/paulveillard/cybersecurity-red-team
@BlueRedTeam
GitHub
GitHub - paulveillard/cybersecurity-red-team: An ongoing & curated collection of awesome software best practices and techniques…
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technica...
#Red_Team
1. WAF/IPS/DLP bypass Cheat Sheet
https://github.com/Bo0oM/WAF-bypass-Cheat-Sheet
2. A flexible tool for redirecting a given program's TCP traffic to SOCKS5/HTTP proxy
https://github.com/hmgle/graftcp
@BlueRedTeam
1. WAF/IPS/DLP bypass Cheat Sheet
https://github.com/Bo0oM/WAF-bypass-Cheat-Sheet
2. A flexible tool for redirecting a given program's TCP traffic to SOCKS5/HTTP proxy
https://github.com/hmgle/graftcp
@BlueRedTeam
GitHub
GitHub - Bo0oM/WAF-bypass-Cheat-Sheet: Another way to bypass WAF Cheat Sheet (draft)
Another way to bypass WAF Cheat Sheet (draft). Contribute to Bo0oM/WAF-bypass-Cheat-Sheet development by creating an account on GitHub.
#exploit
Jnoscript9 Remote Code Execution Exploit
https://github.com/badd1e/Pwn/tree/main/jnoscript9-RCE
// Full PoC exploit for a JIT Type Confusion vulnerability
in Microsoft JavaScript engine (Jnoscript9.dll)
]-> https://zerodayengineering.com/research/javanoscript-engines-exploitation-jnoscript9.html
@BlueRedTeam
Jnoscript9 Remote Code Execution Exploit
https://github.com/badd1e/Pwn/tree/main/jnoscript9-RCE
// Full PoC exploit for a JIT Type Confusion vulnerability
in Microsoft JavaScript engine (Jnoscript9.dll)
]-> https://zerodayengineering.com/research/javanoscript-engines-exploitation-jnoscript9.html
@BlueRedTeam
GitHub
Pwn/jnoscript9-RCE at main · badd1e/Pwn
Advanced exploits that I wrote for Pwn2Own competitions and other occasions - badd1e/Pwn
❤1👍1
Forwarded from Network Penetration Testing
Active Directory Red Team Tools
https://github.com/nobelh/ActiveDirectory
#AD
#RedTeam
#Tools
@NetPentesters
https://github.com/nobelh/ActiveDirectory
#AD
#RedTeam
#Tools
@NetPentesters
GitHub
GitHub - nobelh/ActiveDirectory: Active Directory Red Team Tools
Active Directory Red Team Tools. Contribute to nobelh/ActiveDirectory development by creating an account on GitHub.
👍2🔥1
#Blue_Team
1. A log4j vulnerability filesystem scanner and Go package for analyzing JAR files
https://github.com/google/log4jscanner
2. ISO 27001 Implementation Checklist
https://www.upguard.com/blog/iso-27001-implementation-checklist
@BlueRedTeam
1. A log4j vulnerability filesystem scanner and Go package for analyzing JAR files
https://github.com/google/log4jscanner
2. ISO 27001 Implementation Checklist
https://www.upguard.com/blog/iso-27001-implementation-checklist
@BlueRedTeam
GitHub
GitHub - google/log4jscanner: A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.
A log4j vulnerability filesystem scanner and Go package for analyzing JAR files. - google/log4jscanner
#exploit
#log4Shell
Exploiting CVE-2021-44228 using PDFs as delivery channel
https://github.com/eelyvy/log4jshell-pdf
@BlueRedTeam
#log4Shell
Exploiting CVE-2021-44228 using PDFs as delivery channel
https://github.com/eelyvy/log4jshell-pdf
@BlueRedTeam
GitHub
GitHub - eelyvy/log4jshell-pdf: The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities…
The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel - eelyvy/log4jshell-pdf
#Red_Team
Windows Process Listing Using WTS API
Part 1:
https://tbhaxor.com/windows-process-listing-using-wtsapi32
Part 2:
https://tbhaxor.com/windows-process-listing-using-wtsapi32-2
@BlueRedTeam
Windows Process Listing Using WTS API
Part 1:
https://tbhaxor.com/windows-process-listing-using-wtsapi32
Part 2:
https://tbhaxor.com/windows-process-listing-using-wtsapi32-2
@BlueRedTeam
tbhaxor's Blog
Windows Process Listing Using WTS API – Part 1
In this detailed walkthrough of process listing using WTS API, you will learn the importance of the process listing and enumeration of anti-malware agents and will get your hands dirty with the source code
#Red_Team #ad
New modules for CrackMapExec
Here CrackMapExec has been updated and 5 new modules have been added for vulnerabilities in Windows Active Directory and other services.
Link :
https://github.com/byt3bl33d3r/CrackMapExec
▫️ -M nopac
▫️ -M petitpotam
▫️ -M zerologon
▫️ -M ms17-010
▫️ -M ioxidresolver
@BlueRedTeam
New modules for CrackMapExec
Here CrackMapExec has been updated and 5 new modules have been added for vulnerabilities in Windows Active Directory and other services.
Link :
https://github.com/byt3bl33d3r/CrackMapExec
▫️ -M nopac
▫️ -M petitpotam
▫️ -M zerologon
▫️ -M ms17-010
▫️ -M ioxidresolver
@BlueRedTeam
GitHub
GitHub - byt3bl33d3r/CrackMapExec: A swiss army knife for pentesting networks
A swiss army knife for pentesting networks. Contribute to byt3bl33d3r/CrackMapExec development by creating an account on GitHub.
#exploit
CVE-2021-40906:
CheckMK Management Web Console - Reflected XSS
in an unauthenticated zone
https://github.com/Edgarloyola/CVE-2021-40906
@BlueRedTeam
CVE-2021-40906:
CheckMK Management Web Console - Reflected XSS
in an unauthenticated zone
https://github.com/Edgarloyola/CVE-2021-40906
@BlueRedTeam
GitHub
GitHub - Edgarloyola/CVE-2021-40906
Contribute to Edgarloyola/CVE-2021-40906 development by creating an account on GitHub.
#Red_Team
1. Swift code to programmatically perform dylib injection
https://github.com/cedowens/Inject_Dylib
2. Invoke-Bof - Load any Beacon Object File using Powershell
https://github.com/airbus-cert/Invoke-Bof
@BlueRedTeam
1. Swift code to programmatically perform dylib injection
https://github.com/cedowens/Inject_Dylib
2. Invoke-Bof - Load any Beacon Object File using Powershell
https://github.com/airbus-cert/Invoke-Bof
@BlueRedTeam
GitHub
GitHub - cedowens/Inject_Dylib: Swift code to programmatically perform dylib injection
Swift code to programmatically perform dylib injection - cedowens/Inject_Dylib
#exploit
PHP unserialize write-up with Admin RCE in All in one SEO pack (CVE-2021-24307)
https://darkpills.com/php-unserialize-write-up-with-admin-rce-in-all-in-one-seo-pack-cve-2021-24307
]-> PoC:
https://github.com/darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce
@BlueRedTeam
PHP unserialize write-up with Admin RCE in All in one SEO pack (CVE-2021-24307)
https://darkpills.com/php-unserialize-write-up-with-admin-rce-in-all-in-one-seo-pack-cve-2021-24307
]-> PoC:
https://github.com/darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce
@BlueRedTeam
Darkpills
PHP unserialize write-up with Admin RCE in All in one SEO pack (CVE-2021-24307)
This article provides a detailed walkthrough and tips on how to exploit PHP unserialize vulnerability. It is based on a real world case: Wordpress plugin All in one SEO pack <= 4.1.0.1.
It enables authenticated users with “aioseo_tools_settings” privilege…
It enables authenticated users with “aioseo_tools_settings” privilege…
#Blue_Team
1. Detecting anomalous Vectored Exception Handlers on Windows
https://research.nccgroup.com/2022/01/03/detecting-anomalous-vectored-exception-handlers-on-windows
2. REvil - Incident Response with Redline
https://infosecwriteups.com/revil-incident-response-with-redline-fe7853699216
@BlueRedTeam
1. Detecting anomalous Vectored Exception Handlers on Windows
https://research.nccgroup.com/2022/01/03/detecting-anomalous-vectored-exception-handlers-on-windows
2. REvil - Incident Response with Redline
https://infosecwriteups.com/revil-incident-response-with-redline-fe7853699216
@BlueRedTeam
Nccgroup
Cyber Security Research
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
👍2
#Red_Team
Code for executing simulations used in the \"Training Intelligent Red Team Agents Via Deep Reinforcement Learning\" project
https://github.com/alanballard/Training-Intelligent-Red-Team-Agents-Via-Deep-Reinforcement-Learning
@BlueRedTeam
Code for executing simulations used in the \"Training Intelligent Red Team Agents Via Deep Reinforcement Learning\" project
https://github.com/alanballard/Training-Intelligent-Red-Team-Agents-Via-Deep-Reinforcement-Learning
@BlueRedTeam
GitHub
GitHub - alanballard/Training-Intelligent-Red-Team-Agents-Via-Deep-Reinforcement-Learning: Code for executing simulations used…
Code for executing simulations used in the "Training Intelligent Red Team Agents Via Deep Reinforcement Learning" project - GitHub - alanballard/Training-Intelligent-Red-Team-Agen...
👍1
#exploit
1. CVE-2021-35296:
PTCL Modem HG150-Ub - Authentication Bypass through response manipulation
https://github.com/afaq1337/CVE-2021-35296
2. CVE-2017-5816:
RCE in HP Intelligent Management Center (iMC) PLAT
https://oxagast.org/posts/CVE-2017-5816
@BlueRedTeam
1. CVE-2021-35296:
PTCL Modem HG150-Ub - Authentication Bypass through response manipulation
https://github.com/afaq1337/CVE-2021-35296
2. CVE-2017-5816:
RCE in HP Intelligent Management Center (iMC) PLAT
https://oxagast.org/posts/CVE-2017-5816
@BlueRedTeam
GitHub
GitHub - afaq1337/CVE-2021-35296: PoC of CVE-2021-35296 - PTCL Modem HG150-Ub
PoC of CVE-2021-35296 - PTCL Modem HG150-Ub. Contribute to afaq1337/CVE-2021-35296 development by creating an account on GitHub.
#Red_Team
Code for executing simulations used in the \"Training Intelligent Red Team Agents Via Deep Reinforcement Learning\" project
https://github.com/jaredalanis/Red-vs-Blue
@BlueRedTeam
Code for executing simulations used in the \"Training Intelligent Red Team Agents Via Deep Reinforcement Learning\" project
https://github.com/jaredalanis/Red-vs-Blue
@BlueRedTeam
GitHub
GitHub - jaredalanis/Red-vs-Blue: In this project, I will work on a Red Team vs. Blue Team scenario in which I will play the role…
In this project, I will work on a Red Team vs. Blue Team scenario in which I will play the role of both pentester and SOC analyst. As the Red Team, I will attack a vulnerable VM within my environme...
#Blue_Team
CyberSecurity Blue Team Resources
https://blueteamresources.blogspot.com/2022/01/osi-model.html
@BlueRedTeam
CyberSecurity Blue Team Resources
https://blueteamresources.blogspot.com/2022/01/osi-model.html
@BlueRedTeam
#Blue_Team
Backdoor detection for VMware view post Log4j exploitation (CVE-2021-44228)
https://github.com/mr-r3b00t/CVE-2021-44228
@BlueRedTeam
Backdoor detection for VMware view post Log4j exploitation (CVE-2021-44228)
https://github.com/mr-r3b00t/CVE-2021-44228
@BlueRedTeam
GitHub
GitHub - mr-r3b00t/CVE-2021-44228: Backdoor detection for VMware view
Backdoor detection for VMware view. Contribute to mr-r3b00t/CVE-2021-44228 development by creating an account on GitHub.