#exploit
Use-After-Free Exploit
in HackSysExtremeVulnerableDriver
https://sophieboyle.github.io/2022/04/09/HEVD-UAF-Exploit.html
@BlueRedTeam
Use-After-Free Exploit
in HackSysExtremeVulnerableDriver
https://sophieboyle.github.io/2022/04/09/HEVD-UAF-Exploit.html
@BlueRedTeam
#Red_Team
FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads
https://github.com/pwn1sher/frostbyte
@BlueRedTeam
FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads
https://github.com/pwn1sher/frostbyte
@BlueRedTeam
GitHub
GitHub - pwn1sher/frostbyte: FrostByte is a POC project that combines different defense evasion techniques to build better redteam…
FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads - pwn1sher/frostbyte
#Red_Team
红蓝对抗以及护网相关工具和资料,内存shellcode(cs+msf)和内存马查杀工具
https://github.com/Mr-xn/RedTeam_BlueTeam_HW
@BlueRedTeam
红蓝对抗以及护网相关工具和资料,内存shellcode(cs+msf)和内存马查杀工具
https://github.com/Mr-xn/RedTeam_BlueTeam_HW
@BlueRedTeam
GitHub
GitHub - Mr-xn/RedTeam_BlueTeam_HW: 红蓝对抗以及护网相关工具和资料,内存shellcode(cs+msf)和内存马查杀工具
红蓝对抗以及护网相关工具和资料,内存shellcode(cs+msf)和内存马查杀工具. Contribute to Mr-xn/RedTeam_BlueTeam_HW development by creating an account on GitHub.
#Red_Team
Windows Red Team Cheat Sheet
https://reconshell.com/windows-red-team-cheat-sheet/
@BlueRedTeam
Windows Red Team Cheat Sheet
https://reconshell.com/windows-red-team-cheat-sheet/
@BlueRedTeam
🔥7🥰2👍1
#Blue_Team
Microsoft Windows 10/11/server 2016 and above recommended block rules
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules
@BlueRedTeam
Microsoft Windows 10/11/server 2016 and above recommended block rules
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules
@BlueRedTeam
Docs
Applications that can bypass App Control and how to block them
View a list of recommended block rules, based on knowledge shared between Microsoft and the wider security community.
#Red_Team
1. In-Process Patchless AMSI Bypass
https://ethicalchaos.dev/2022/04/17/in-process-patchless-amsi-bypass
2. Analyzing Palo Alto Cortex XDR and finding ways to bypass it
https://mrd0x.com/cortex-xdr-analysis-and-bypass
@BlueRedTeam
1. In-Process Patchless AMSI Bypass
https://ethicalchaos.dev/2022/04/17/in-process-patchless-amsi-bypass
2. Analyzing Palo Alto Cortex XDR and finding ways to bypass it
https://mrd0x.com/cortex-xdr-analysis-and-bypass
@BlueRedTeam
Ethical Chaos
In-Process Patchless AMSI Bypass - Ethical Chaos
Some of you may remember my patchless AMSI bypass article and how it was used inside SharpBlock to bypass AMSI on the child process that SharpBlock spawns. This is all well a good when up against client environments that are not too sensitive to the fork…
#Red_Team
A Detailed Guide on HTML Smuggling
https://www.hackingarticles.in/a-detailed-guide-on-html-smuggling
@BlueRedTeam
A Detailed Guide on HTML Smuggling
https://www.hackingarticles.in/a-detailed-guide-on-html-smuggling
@BlueRedTeam
Hacking Articles
A Detailed Guide on HTML Smuggling
Learn how HTML Smuggling bypasses firewalls using JS blobs and payloads, with live noscripts, attack demos, and mitigation steps.
#Red_Team
+ Persisting XSS With IFrame Traps
https://www.trustedsec.com/blog/persisting-xss-with-iframe-traps
+ The all-in-one Red Team extension for Web Pentester
https://github.com/LasCC/Hack-Tools
@BlueRedTeam
+ Persisting XSS With IFrame Traps
https://www.trustedsec.com/blog/persisting-xss-with-iframe-traps
+ The all-in-one Red Team extension for Web Pentester
https://github.com/LasCC/Hack-Tools
@BlueRedTeam
TrustedSec
Persisting XSS With IFrame Traps
It may be a reflected XSS vulnerability where we've tricked our user into clicking a link, but when they land on the page where we were able to inject our…
#exploit
+ bluez: malicious USB devices can steal Bluetooth link keys over HCI using fake BD_ADDR, plus bluetoothd double-free
https://bugs.chromium.org/p/project-zero/issues/detail?id=2256
+ CVE-2022-0995:
Linux: watch_queue filter OOB write (and other bugs)
https://bugs.chromium.org/p/project-zero/issues/detail?id=2274
@BlueRedTeam
+ bluez: malicious USB devices can steal Bluetooth link keys over HCI using fake BD_ADDR, plus bluetoothd double-free
https://bugs.chromium.org/p/project-zero/issues/detail?id=2256
+ CVE-2022-0995:
Linux: watch_queue filter OOB write (and other bugs)
https://bugs.chromium.org/p/project-zero/issues/detail?id=2274
@BlueRedTeam
#CVE-2022
CVE-2022-21449 Proof of Concept demonstrating its usage with a vulnerable client and a malicious TLS server
https://github.com/khalednassar/CVE-2022-21449-TLS-PoC
@BlueRedTeam
CVE-2022-21449 Proof of Concept demonstrating its usage with a vulnerable client and a malicious TLS server
https://github.com/khalednassar/CVE-2022-21449-TLS-PoC
@BlueRedTeam
GitHub
GitHub - notkmhn/CVE-2022-21449-TLS-PoC: CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable…
CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server - notkmhn/CVE-2022-21449-TLS-PoC
#CVE-2022
This repository contains a PoC for remote code execution CVE-2022-26809
https://github.com/DESC0N0C1D0/CVE-2022-26809-RCE
@BlueRedTeam
This repository contains a PoC for remote code execution CVE-2022-26809
https://github.com/DESC0N0C1D0/CVE-2022-26809-RCE
@BlueRedTeam
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
https://github.com/MISP/MISP
@BlueRedTeam
https://github.com/MISP/MISP
@BlueRedTeam
GitHub
GitHub - MISP/MISP: MISP (core software) - Open Source Threat Intelligence and Sharing Platform
MISP (core software) - Open Source Threat Intelligence and Sharing Platform - MISP/MISP
#exploit
+ CVE-2022-21449:
"Psychic Signatures"
PoC demonstrating its usage with a vulnerable client and a malicious TLS server
https://github.com/khalednassar/CVE-2022-21449-TLS-PoC
+ CVE-2022-21449:
Exploitation and Sample Vulnerable Application of the JWT Null Signature Vulnerability
https://github.com/DataDog/security-labs-pocs/tree/main/proof-of-concept-exploits/jwt-null-signature-vulnerable-app
@BlueRedTeam
+ CVE-2022-21449:
"Psychic Signatures"
PoC demonstrating its usage with a vulnerable client and a malicious TLS server
https://github.com/khalednassar/CVE-2022-21449-TLS-PoC
+ CVE-2022-21449:
Exploitation and Sample Vulnerable Application of the JWT Null Signature Vulnerability
https://github.com/DataDog/security-labs-pocs/tree/main/proof-of-concept-exploits/jwt-null-signature-vulnerable-app
@BlueRedTeam
GitHub
GitHub - notkmhn/CVE-2022-21449-TLS-PoC: CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable…
CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server - notkmhn/CVE-2022-21449-TLS-PoC