#CVE-2022
Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit
https://github.com/M4xSec/Apache-APISIX-CVE-2022-24112
@BlueRedTeam
Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit
https://github.com/M4xSec/Apache-APISIX-CVE-2022-24112
@BlueRedTeam
GitHub
GitHub - M4xSec/Apache-APISIX-CVE-2022-24112: Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit
Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit - GitHub - M4xSec/Apache-APISIX-CVE-2022-24112: Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept ...
#Red_Team
Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement
https://github.com/carlwarnberg/FinalEngagement
@BlueRedTeam
Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement
https://github.com/carlwarnberg/FinalEngagement
@BlueRedTeam
GitHub
GitHub - carlwarnberg/FinalEngagement: In a similar vein to Project 2, in this third and final project, we were tasked with performing…
In a similar vein to Project 2, in this third and final project, we were tasked with performing the duties of a Red Team pen tester and a Blue Team SOC analyst, with the added wrinkle of inspecting...
#Red_Team
1. Browser In The Browser (BITB) Attack
https://mrd0x.com/browser-in-the-browser-phishing-attack
2. Simple way to bypass GateKeeper (CVE-2022-22616)
https://jhftss.github.io/CVE-2022-22616-Gatekeeper-Bypass
@BlueRedTeam
1. Browser In The Browser (BITB) Attack
https://mrd0x.com/browser-in-the-browser-phishing-attack
2. Simple way to bypass GateKeeper (CVE-2022-22616)
https://jhftss.github.io/CVE-2022-22616-Gatekeeper-Bypass
@BlueRedTeam
Mrd0X
Security Research | mr.d0x
Providing security research and red team techniques
#exploit
From XSS to RCE (dompdf 0day)
https://positive.security/blog/dompdf-rce
]-> RCE exploit for dompdf:
https://github.com/positive-security/dompdf-rce
@BlueRedTeam
From XSS to RCE (dompdf 0day)
https://positive.security/blog/dompdf-rce
]-> RCE exploit for dompdf:
https://github.com/positive-security/dompdf-rce
@BlueRedTeam
positive.security
From XSS to RCE (dompdf 0day) | Positive Security
Using a still unpatched vulnerability in the PHP library dompdf (used for rendering PDFs from HTML), we achieved RCE on a web server with merely a reflected XSS vulnerability as entry point.
#Red_Team
Red Team Field broken down into subject in markdown format
https://github.com/infosecwatchman/rtfm-1
@BlueRedTeam
Red Team Field broken down into subject in markdown format
https://github.com/infosecwatchman/rtfm-1
@BlueRedTeam
GitHub
GitHub - infosecwatchman/rtfm-1: Red Team Field broken down into subject in markdown format
Red Team Field broken down into subject in markdown format - infosecwatchman/rtfm-1
#Blue_Team
Securing Developer Tools:
Git Integrations
https://blog.sonarsource.com/securing-developer-tools-git-integrations
@BlueRedTeam
Securing Developer Tools:
Git Integrations
https://blog.sonarsource.com/securing-developer-tools-git-integrations
@BlueRedTeam
Sonarsource
Securing Developer Tools: Git Integrations
With this series, we present the results of our research on the security of popular developer tools with the goal of making this ecosystem safer: today’s article revisits Git integrations.
#tools
#Red_Team
1. 0d1n: Tool for automating customized attacks against web applications
https://github.com/CoolerVoid/0d1n
2. Abusing Kerberos Constrained Delegation without Protocol Transition
https://snovvcrash.rocks/2022/03/06/abusing-kcd-without-protocol-transition.html
@BlueRedTeam
#Red_Team
1. 0d1n: Tool for automating customized attacks against web applications
https://github.com/CoolerVoid/0d1n
2. Abusing Kerberos Constrained Delegation without Protocol Transition
https://snovvcrash.rocks/2022/03/06/abusing-kcd-without-protocol-transition.html
@BlueRedTeam
👍1
#exploit
Abusing Arbitrary File Deletes to Escalate Privilege and Other Great Tricks
https://www.zerodayinitiative.com/blog/2022/3/16/abusing-arbitrary-file-deletes-to-escalate-privilege-and-other-great-tricks
@BlueRedTeam
Abusing Arbitrary File Deletes to Escalate Privilege and Other Great Tricks
https://www.zerodayinitiative.com/blog/2022/3/16/abusing-arbitrary-file-deletes-to-escalate-privilege-and-other-great-tricks
@BlueRedTeam
Zero Day Initiative
Zero Day Initiative — Abusing Arbitrary File Deletes to Escalate Privilege and Other Great Tricks
We would like to thank researcher Abdelhamid Naceri for his great work in developing these exploit techniques, as well as for the vulnerabilities he has been reporting to our program. We look forward to seeing more from him in the future. Until then, follow…
👍1
#CVE-2022
TOP All bugbounty pentesting CVE-2022- POC Exp Things
https://github.com/hktalent/TOP
@BlueRedTeam
TOP All bugbounty pentesting CVE-2022- POC Exp Things
https://github.com/hktalent/TOP
@BlueRedTeam
GitHub
GitHub - GhostTroops/TOP: TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things - GhostTroops/TOP
#Red_Team
Red Team Privilege Escalation
Part 1 - Writable SYSTEM Path Privilege Escalation
https://www.praetorian.com/blog/red-team-local-privilege-escalation-writable-system-path-privilege-escalation-part-1
Part 2 - RBCD Based Privilege Escalation
https://www.praetorian.com/blog/red-team-privilege-escalation-rbcd-based-privilege-escalation-part-2
@BlueRedTeam
Red Team Privilege Escalation
Part 1 - Writable SYSTEM Path Privilege Escalation
https://www.praetorian.com/blog/red-team-local-privilege-escalation-writable-system-path-privilege-escalation-part-1
Part 2 - RBCD Based Privilege Escalation
https://www.praetorian.com/blog/red-team-privilege-escalation-rbcd-based-privilege-escalation-part-2
@BlueRedTeam
Praetorian
Red Team Local Privilege Escalation - Writable SYSTEM Path Privilege Escalation - Part 1
Overview In this two-part series we discuss two Windows local privilege escalation vulnerabilities that we commonly identify during red team operations. These issues are of particular interest due to their prevalence within organizations with mature security…
#exploit
CVE-2022-27226:
CSRF to RCE in iRZ Mobile Routers through 2022-03-16
https://johnjhacking.com/blog/cve-2022-27226
]-> PoC: https://github.com/SakuraSamuraii/ez-iRZ
@BlueRedTeam
CVE-2022-27226:
CSRF to RCE in iRZ Mobile Routers through 2022-03-16
https://johnjhacking.com/blog/cve-2022-27226
]-> PoC: https://github.com/SakuraSamuraii/ez-iRZ
@BlueRedTeam
Johnjhacking
CVE-2022-27226: CSRF to RCE in iRZ Mobile Routers through 2022-03-16
A CSRF issue on iRZ Mobile Routers through 2022-03-16 allows a threat actor to create a crontab entry in the router administration panel. The cronjob will consequently execute the entry on the threat actor's defined interval, leading to remote code execution…
#Red_Team
Windows Red Team Exploitation Techniques
https://hackersploit.org/windows-red-team-exploitation-techniques
@BlueRedTeam
Windows Red Team Exploitation Techniques
https://hackersploit.org/windows-red-team-exploitation-techniques
@BlueRedTeam
HackerSploit Blog
Windows Red Team Exploitation Techniques
Our objective is to generate a malicious office document that contains a macro that will provide us with a reverse shell on the target system when executed.
👍2🔥2
#Red_Team
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
https://github.com/danielmaxio/Atomic-Red-Team-Intelligence-C2
@BlueRedTeam
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
https://github.com/danielmaxio/Atomic-Red-Team-Intelligence-C2
@BlueRedTeam
👍1
#Red_Team
The all-in-one Red Team extension for Web Pentester 🛠
https://github.com/LasCC/Hack-Tools
@BlueRedTeam
The all-in-one Red Team extension for Web Pentester 🛠
https://github.com/LasCC/Hack-Tools
@BlueRedTeam
GitHub
GitHub - LasCC/HackTools: The all-in-one browser extension for offensive security professionals 🛠
The all-in-one browser extension for offensive security professionals 🛠 - LasCC/HackTools
#Red_Team
1. Unconstrained Delegation
https://pentestlab.blog/2022/03/21/unconstrained-delegation
2. Initial Access - Right-To-Left Override
https://www.exandroid.dev/2022/03/21/initial-access-right-to-left-override-t1036002
@BlueRedTeam
1. Unconstrained Delegation
https://pentestlab.blog/2022/03/21/unconstrained-delegation
2. Initial Access - Right-To-Left Override
https://www.exandroid.dev/2022/03/21/initial-access-right-to-left-override-t1036002
@BlueRedTeam
Penetration Testing Lab
Unconstrained Delegation
Microsoft to support scenarios where users authenticate via Kerberos to one system and information needs to be updated on another system implemented unconstrained delegation. This was implemented i…
#Red_Team
Cyber security,Red Teaming and CTF Writeup's
https://github.com/0xStarlight/0xStarlight.github.io
@BlueRedTeam
Cyber security,Red Teaming and CTF Writeup's
https://github.com/0xStarlight/0xStarlight.github.io
@BlueRedTeam
GitHub
GitHub - 0xStarlight/0xStarlight.github.io: Cyber security, Red Teaming and CTF Writeup's.
Cyber security, Red Teaming and CTF Writeup's. Contribute to 0xStarlight/0xStarlight.github.io development by creating an account on GitHub.
👍1
#Red_Team
OffSecOps: Using Jenkins For Red Team Tooling
https://http418infosec.com/offsecops-using-jenkins-for-red-team-tooling
@BlueRedTeam
OffSecOps: Using Jenkins For Red Team Tooling
https://http418infosec.com/offsecops-using-jenkins-for-red-team-tooling
@BlueRedTeam
HTTP418InfoSec
OffSecOps: Using Jenkins For Red Team Tooling - HTTP418InfoSec
A quick look at how Jenkins can be used to automatically build payloads and tooling, based on the OffSecOps talk by Harmj0y.
👍1
#tools
#Red_Team
Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token Impersonation
https://github.com/FULLSHADE/Auto-Elevate
@BlueRedTeam
#Red_Team
Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token Impersonation
https://github.com/FULLSHADE/Auto-Elevate
@BlueRedTeam
GitHub
GitHub - FULLSHADE/Auto-Elevate: Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit…
Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token Impersonation - FULLSHADE/Auto-Elevate
#Cobalt_Strike
A collection of C# utilities intended to be used with Cobalt Strike's execute-assembly
https://github.com/breakid/SharpUtils
@BlueRedTeam
A collection of C# utilities intended to be used with Cobalt Strike's execute-assembly
https://github.com/breakid/SharpUtils
@BlueRedTeam
GitHub
GitHub - breakid/SharpUtils: A collection of C# utilities intended to be used with Cobalt Strike's execute-assembly
A collection of C# utilities intended to be used with Cobalt Strike's execute-assembly - GitHub - breakid/SharpUtils: A collection of C# utilities intended to be used with Cobalt Strike&...