Forwarded from Network Penetration Testing
Active Directory Red Team Tools
https://github.com/nobelh/ActiveDirectory
#AD
#RedTeam
#Tools
@NetPentesters
https://github.com/nobelh/ActiveDirectory
#AD
#RedTeam
#Tools
@NetPentesters
GitHub
GitHub - nobelh/ActiveDirectory: Active Directory Red Team Tools
Active Directory Red Team Tools. Contribute to nobelh/ActiveDirectory development by creating an account on GitHub.
👍2🔥1
#Blue_Team
1. A log4j vulnerability filesystem scanner and Go package for analyzing JAR files
https://github.com/google/log4jscanner
2. ISO 27001 Implementation Checklist
https://www.upguard.com/blog/iso-27001-implementation-checklist
@BlueRedTeam
1. A log4j vulnerability filesystem scanner and Go package for analyzing JAR files
https://github.com/google/log4jscanner
2. ISO 27001 Implementation Checklist
https://www.upguard.com/blog/iso-27001-implementation-checklist
@BlueRedTeam
GitHub
GitHub - google/log4jscanner: A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.
A log4j vulnerability filesystem scanner and Go package for analyzing JAR files. - google/log4jscanner
#exploit
#log4Shell
Exploiting CVE-2021-44228 using PDFs as delivery channel
https://github.com/eelyvy/log4jshell-pdf
@BlueRedTeam
#log4Shell
Exploiting CVE-2021-44228 using PDFs as delivery channel
https://github.com/eelyvy/log4jshell-pdf
@BlueRedTeam
GitHub
GitHub - eelyvy/log4jshell-pdf: The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities…
The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel - eelyvy/log4jshell-pdf
#Red_Team
Windows Process Listing Using WTS API
Part 1:
https://tbhaxor.com/windows-process-listing-using-wtsapi32
Part 2:
https://tbhaxor.com/windows-process-listing-using-wtsapi32-2
@BlueRedTeam
Windows Process Listing Using WTS API
Part 1:
https://tbhaxor.com/windows-process-listing-using-wtsapi32
Part 2:
https://tbhaxor.com/windows-process-listing-using-wtsapi32-2
@BlueRedTeam
tbhaxor's Blog
Windows Process Listing Using WTS API – Part 1
In this detailed walkthrough of process listing using WTS API, you will learn the importance of the process listing and enumeration of anti-malware agents and will get your hands dirty with the source code
#Red_Team #ad
New modules for CrackMapExec
Here CrackMapExec has been updated and 5 new modules have been added for vulnerabilities in Windows Active Directory and other services.
Link :
https://github.com/byt3bl33d3r/CrackMapExec
▫️ -M nopac
▫️ -M petitpotam
▫️ -M zerologon
▫️ -M ms17-010
▫️ -M ioxidresolver
@BlueRedTeam
New modules for CrackMapExec
Here CrackMapExec has been updated and 5 new modules have been added for vulnerabilities in Windows Active Directory and other services.
Link :
https://github.com/byt3bl33d3r/CrackMapExec
▫️ -M nopac
▫️ -M petitpotam
▫️ -M zerologon
▫️ -M ms17-010
▫️ -M ioxidresolver
@BlueRedTeam
GitHub
GitHub - byt3bl33d3r/CrackMapExec: A swiss army knife for pentesting networks
A swiss army knife for pentesting networks. Contribute to byt3bl33d3r/CrackMapExec development by creating an account on GitHub.
#exploit
CVE-2021-40906:
CheckMK Management Web Console - Reflected XSS
in an unauthenticated zone
https://github.com/Edgarloyola/CVE-2021-40906
@BlueRedTeam
CVE-2021-40906:
CheckMK Management Web Console - Reflected XSS
in an unauthenticated zone
https://github.com/Edgarloyola/CVE-2021-40906
@BlueRedTeam
GitHub
GitHub - Edgarloyola/CVE-2021-40906
Contribute to Edgarloyola/CVE-2021-40906 development by creating an account on GitHub.
#Red_Team
1. Swift code to programmatically perform dylib injection
https://github.com/cedowens/Inject_Dylib
2. Invoke-Bof - Load any Beacon Object File using Powershell
https://github.com/airbus-cert/Invoke-Bof
@BlueRedTeam
1. Swift code to programmatically perform dylib injection
https://github.com/cedowens/Inject_Dylib
2. Invoke-Bof - Load any Beacon Object File using Powershell
https://github.com/airbus-cert/Invoke-Bof
@BlueRedTeam
GitHub
GitHub - cedowens/Inject_Dylib: Swift code to programmatically perform dylib injection
Swift code to programmatically perform dylib injection - cedowens/Inject_Dylib
#exploit
PHP unserialize write-up with Admin RCE in All in one SEO pack (CVE-2021-24307)
https://darkpills.com/php-unserialize-write-up-with-admin-rce-in-all-in-one-seo-pack-cve-2021-24307
]-> PoC:
https://github.com/darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce
@BlueRedTeam
PHP unserialize write-up with Admin RCE in All in one SEO pack (CVE-2021-24307)
https://darkpills.com/php-unserialize-write-up-with-admin-rce-in-all-in-one-seo-pack-cve-2021-24307
]-> PoC:
https://github.com/darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce
@BlueRedTeam
Darkpills
PHP unserialize write-up with Admin RCE in All in one SEO pack (CVE-2021-24307)
This article provides a detailed walkthrough and tips on how to exploit PHP unserialize vulnerability. It is based on a real world case: Wordpress plugin All in one SEO pack <= 4.1.0.1.
It enables authenticated users with “aioseo_tools_settings” privilege…
It enables authenticated users with “aioseo_tools_settings” privilege…
#Blue_Team
1. Detecting anomalous Vectored Exception Handlers on Windows
https://research.nccgroup.com/2022/01/03/detecting-anomalous-vectored-exception-handlers-on-windows
2. REvil - Incident Response with Redline
https://infosecwriteups.com/revil-incident-response-with-redline-fe7853699216
@BlueRedTeam
1. Detecting anomalous Vectored Exception Handlers on Windows
https://research.nccgroup.com/2022/01/03/detecting-anomalous-vectored-exception-handlers-on-windows
2. REvil - Incident Response with Redline
https://infosecwriteups.com/revil-incident-response-with-redline-fe7853699216
@BlueRedTeam
Nccgroup
Cyber Security Research
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
👍2
#Red_Team
Code for executing simulations used in the \"Training Intelligent Red Team Agents Via Deep Reinforcement Learning\" project
https://github.com/alanballard/Training-Intelligent-Red-Team-Agents-Via-Deep-Reinforcement-Learning
@BlueRedTeam
Code for executing simulations used in the \"Training Intelligent Red Team Agents Via Deep Reinforcement Learning\" project
https://github.com/alanballard/Training-Intelligent-Red-Team-Agents-Via-Deep-Reinforcement-Learning
@BlueRedTeam
GitHub
GitHub - alanballard/Training-Intelligent-Red-Team-Agents-Via-Deep-Reinforcement-Learning: Code for executing simulations used…
Code for executing simulations used in the "Training Intelligent Red Team Agents Via Deep Reinforcement Learning" project - GitHub - alanballard/Training-Intelligent-Red-Team-Agen...
👍1
#exploit
1. CVE-2021-35296:
PTCL Modem HG150-Ub - Authentication Bypass through response manipulation
https://github.com/afaq1337/CVE-2021-35296
2. CVE-2017-5816:
RCE in HP Intelligent Management Center (iMC) PLAT
https://oxagast.org/posts/CVE-2017-5816
@BlueRedTeam
1. CVE-2021-35296:
PTCL Modem HG150-Ub - Authentication Bypass through response manipulation
https://github.com/afaq1337/CVE-2021-35296
2. CVE-2017-5816:
RCE in HP Intelligent Management Center (iMC) PLAT
https://oxagast.org/posts/CVE-2017-5816
@BlueRedTeam
GitHub
GitHub - afaq1337/CVE-2021-35296: PoC of CVE-2021-35296 - PTCL Modem HG150-Ub
PoC of CVE-2021-35296 - PTCL Modem HG150-Ub. Contribute to afaq1337/CVE-2021-35296 development by creating an account on GitHub.
#Red_Team
Code for executing simulations used in the \"Training Intelligent Red Team Agents Via Deep Reinforcement Learning\" project
https://github.com/jaredalanis/Red-vs-Blue
@BlueRedTeam
Code for executing simulations used in the \"Training Intelligent Red Team Agents Via Deep Reinforcement Learning\" project
https://github.com/jaredalanis/Red-vs-Blue
@BlueRedTeam
GitHub
GitHub - jaredalanis/Red-vs-Blue: In this project, I will work on a Red Team vs. Blue Team scenario in which I will play the role…
In this project, I will work on a Red Team vs. Blue Team scenario in which I will play the role of both pentester and SOC analyst. As the Red Team, I will attack a vulnerable VM within my environme...
#Blue_Team
CyberSecurity Blue Team Resources
https://blueteamresources.blogspot.com/2022/01/osi-model.html
@BlueRedTeam
CyberSecurity Blue Team Resources
https://blueteamresources.blogspot.com/2022/01/osi-model.html
@BlueRedTeam
#Blue_Team
Backdoor detection for VMware view post Log4j exploitation (CVE-2021-44228)
https://github.com/mr-r3b00t/CVE-2021-44228
@BlueRedTeam
Backdoor detection for VMware view post Log4j exploitation (CVE-2021-44228)
https://github.com/mr-r3b00t/CVE-2021-44228
@BlueRedTeam
GitHub
GitHub - mr-r3b00t/CVE-2021-44228: Backdoor detection for VMware view
Backdoor detection for VMware view. Contribute to mr-r3b00t/CVE-2021-44228 development by creating an account on GitHub.
#Red_Team
A collection of Python noscripts for Red Teaming or otherwise
https://github.com/kussic/offensive-noscripts
@BlueRedTeam
A collection of Python noscripts for Red Teaming or otherwise
https://github.com/kussic/offensive-noscripts
@BlueRedTeam
GitHub
GitHub - rivet1337/offensive-noscripts: A collection of Python noscripts for Red Teaming or otherwise
A collection of Python noscripts for Red Teaming or otherwise - GitHub - rivet1337/offensive-noscripts: A collection of Python noscripts for Red Teaming or otherwise
#exploit
1. CVE-2021-30937:
XNU: heap-use-after-free in inm_merge
https://bugs.chromium.org/p/project-zero/issues/detail?id=2224
2. PHP disable_functions bypass
https://github.com/mm0r1/exploits
@BlueRedTeam
1. CVE-2021-30937:
XNU: heap-use-after-free in inm_merge
https://bugs.chromium.org/p/project-zero/issues/detail?id=2224
2. PHP disable_functions bypass
https://github.com/mm0r1/exploits
@BlueRedTeam
GitHub
GitHub - mm0r1/exploits: Pwn stuff.
Pwn stuff. Contribute to mm0r1/exploits development by creating an account on GitHub.
👍1
#Red_Team
Red Team Templates For Obsidian.md
https://github.com/cwinfosec/redteam_obsidian_templates
@BlueRedTeam
Red Team Templates For Obsidian.md
https://github.com/cwinfosec/redteam_obsidian_templates
@BlueRedTeam
GitHub
GitHub - cwinfosec/redteam_obsidian_templates: Red Team Templates For Obsidian.md
Red Team Templates For Obsidian.md. Contribute to cwinfosec/redteam_obsidian_templates development by creating an account on GitHub.
❤1
#Red_Team
Polymorphic code obfuscator for use in Red Team operations
https://github.com/maltek-labs/Malcode-Obfuscator
@BlueRedTeam
Polymorphic code obfuscator for use in Red Team operations
https://github.com/maltek-labs/Malcode-Obfuscator
@BlueRedTeam
GitHub
GitHub - maltek-labs/Malcode-Obfuscator: Polymorphic code obfuscator for use in Red Team operations
Polymorphic code obfuscator for use in Red Team operations - maltek-labs/Malcode-Obfuscator
#CVE-2021
Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.
https://github.com/puzzlepeaches/Log4jHorizon
@BlueRedTeam
Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.
https://github.com/puzzlepeaches/Log4jHorizon
@BlueRedTeam
GitHub
GitHub - puzzlepeaches/Log4jHorizon: Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.
Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more. - puzzlepeaches/Log4jHorizon