#CVE-2022
PoC for CVE-2022-1388_F5_BIG-IP
https://github.com/sherlocksecurity/CVE-2022-1388_F5_BIG-IP_RCE
@BlueRedTeam
PoC for CVE-2022-1388_F5_BIG-IP
https://github.com/sherlocksecurity/CVE-2022-1388_F5_BIG-IP_RCE
@BlueRedTeam
GitHub
GitHub - sherlocksecurity/CVE-2022-1388-Exploit-POC: PoC for CVE-2022-1388_F5_BIG-IP
PoC for CVE-2022-1388_F5_BIG-IP. Contribute to sherlocksecurity/CVE-2022-1388-Exploit-POC development by creating an account on GitHub.
#CVE-2022
CVE-2022-1388 F5 Big IP unauth remote code execution
https://github.com/Vulnmachines/F5-Big-IP-CVE-2022-1388
@BlueRedTeam
CVE-2022-1388 F5 Big IP unauth remote code execution
https://github.com/Vulnmachines/F5-Big-IP-CVE-2022-1388
@BlueRedTeam
GitHub
GitHub - Vulnmachines/F5-Big-IP-CVE-2022-1388: CVE-2022-1388 F5 Big IP unauth remote code execution
CVE-2022-1388 F5 Big IP unauth remote code execution - Vulnmachines/F5-Big-IP-CVE-2022-1388
#Cobalt_Strike
pyCobaltHound is an Aggressor noscript extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Bloodhound.
https://github.com/NVISOsecurity/pyCobaltHound
@BlueRedTeam
pyCobaltHound is an Aggressor noscript extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Bloodhound.
https://github.com/NVISOsecurity/pyCobaltHound
@BlueRedTeam
GitHub
GitHub - NVISOsecurity/pyCobaltHound: pyCobaltHound is an Aggressor noscript extension for Cobalt Strike which aims to provide a…
pyCobaltHound is an Aggressor noscript extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Bloodhound. - GitHub - NVISOsecurity/pyCobaltHound: pyCobaltHoun...
❤6
#Cobalt_Strike
ShellCode Loader for MSF and Cobalt Strike
https://github.com/LDrakura/ShellCodeLoader
@BlueRedTeam
ShellCode Loader for MSF and Cobalt Strike
https://github.com/LDrakura/ShellCodeLoader
@BlueRedTeam
GitHub
GitHub - LDrakura/ShellCodeLoader: ShellCode Loader for MSF and Cobalt Strike
ShellCode Loader for MSF and Cobalt Strike. Contribute to LDrakura/ShellCodeLoader development by creating an account on GitHub.
#CVE-2022
F5 BIG-IP RCE exploitation (CVE-2022-1388)
https://github.com/alt3kx/CVE-2022-1388_PoC
@BlueRedTeam
F5 BIG-IP RCE exploitation (CVE-2022-1388)
https://github.com/alt3kx/CVE-2022-1388_PoC
@BlueRedTeam
GitHub
GitHub - alt3kx/CVE-2022-1388_PoC: F5 BIG-IP RCE exploitation (CVE-2022-1388)
F5 BIG-IP RCE exploitation (CVE-2022-1388). Contribute to alt3kx/CVE-2022-1388_PoC development by creating an account on GitHub.
#CVE-2022
CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime
https://github.com/ExploitPwner/CVE-2022-26809-RCE-POC
@BlueRedTeam
CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime
https://github.com/ExploitPwner/CVE-2022-26809-RCE-POC
@BlueRedTeam
#Red_Team
+ Abusing HTTP hop-by-hop request headers
https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers
+ A collection of GCP IAM privilege escalation methods
https://github.com/RhinoSecurityLabs/GCP-IAM-Privilege-Escalation
@BlueRedTeam
+ Abusing HTTP hop-by-hop request headers
https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers
+ A collection of GCP IAM privilege escalation methods
https://github.com/RhinoSecurityLabs/GCP-IAM-Privilege-Escalation
@BlueRedTeam
GitHub
GitHub - RhinoSecurityLabs/GCP-IAM-Privilege-Escalation: A collection of GCP IAM privilege escalation methods documented by the…
A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team. - RhinoSecurityLabs/GCP-IAM-Privilege-Escalation
#CVE-2022
[Reserved For CVE-2022-29554]
https://github.com/ComparedArray/printix-CVE-2022-29554
@BlueRedTeam
[Reserved For CVE-2022-29554]
https://github.com/ComparedArray/printix-CVE-2022-29554
@BlueRedTeam
GitHub
GitHub - ComparedArray/printix-CVE-2022-29554: A "Mishandling of Input to API" or "Exposed Dangerous Method or Function" vulnerability…
A "Mishandling of Input to API" or "Exposed Dangerous Method or Function" vulnerability in PrintixService.exe, in Kofax Printix's "Printix Secur...
#CVE-2022
BIG-IP iCONTROL REST AUTH BYPASS RCE POC CVE-2022-1388
https://github.com/TomArni680/CVE-2022-1388-POC
@BlueRedTeam
BIG-IP iCONTROL REST AUTH BYPASS RCE POC CVE-2022-1388
https://github.com/TomArni680/CVE-2022-1388-POC
@BlueRedTeam
#CVE-2022
A Test API for testing the POC against CVE-2022-1388
https://github.com/bandit92/CVE2022-1388_TestAPI
@BlueRedTeam
A Test API for testing the POC against CVE-2022-1388
https://github.com/bandit92/CVE2022-1388_TestAPI
@BlueRedTeam
GitHub
GitHub - bandit92/CVE2022-1388_TestAPI: A Test API for testing the POC against CVE-2022-1388
A Test API for testing the POC against CVE-2022-1388 - bandit92/CVE2022-1388_TestAPI
#Red_Team
Red Teaming and Penetration Testing Checklist, Cheatsheet, Clicknoscript
https://github.com/ibr0wse/RedTeam-PenTest-Cheatsheet-Checklist
@BlueRedTeam
Red Teaming and Penetration Testing Checklist, Cheatsheet, Clicknoscript
https://github.com/ibr0wse/RedTeam-PenTest-Cheatsheet-Checklist
@BlueRedTeam
GitHub
GitHub - ibr0wse/RedTeam-PenTest-Cheatsheet-Checklist: Red Teaming and Penetration Testing Checklist, Cheatsheet, Clicknoscript
Red Teaming and Penetration Testing Checklist, Cheatsheet, Clicknoscript - ibr0wse/RedTeam-PenTest-Cheatsheet-Checklist
#webshell
Automatically create user email (SMTP / WEBMAIL) on webshell
https://github.com/biulove0x/CreateEmail-SMTP-WEBMAIL
@BlueRedTeam
Automatically create user email (SMTP / WEBMAIL) on webshell
https://github.com/biulove0x/CreateEmail-SMTP-WEBMAIL
@BlueRedTeam
👍1
#Red_Team
+ Exploiting IRCTC along with few other government domains through XXE
https://systemweakness.com/exploiting-irctc-along-with-few-other-government-domains-through-xxe-cd7a9ff698
+ ServiceMove-BOF:
Lateral movement technique by abusing Windows Perception Simulation Service
https://github.com/netero1010/ServiceMove-BOF
+ Protected Process Light (PPL) Attack
https://paper.seebug.org/1892/
@BlueRedTeam
+ Exploiting IRCTC along with few other government domains through XXE
https://systemweakness.com/exploiting-irctc-along-with-few-other-government-domains-through-xxe-cd7a9ff698
+ ServiceMove-BOF:
Lateral movement technique by abusing Windows Perception Simulation Service
https://github.com/netero1010/ServiceMove-BOF
+ Protected Process Light (PPL) Attack
https://paper.seebug.org/1892/
@BlueRedTeam
Medium
Exploiting IRCTC along with few other government domains through XXE
In this blog, I would be giving an Insight about XXE(XML External Entity) injection and a practical attack case study where I did…
#Blue_Team
Prioritizing ATT&CK Techniques
https://medium.com/mitre-engenuity/where-to-begin-prioritizing-att-ck-techniques-c535b50983f4
]-> Top ATT&CK Techniques - calculator:
https://top-attack-techniques.mitre-engenuity.org
]-> Methodology:
https://top-attack-techniques.mitre-engenuity.org/methodology
@BlueRedTeam
Prioritizing ATT&CK Techniques
https://medium.com/mitre-engenuity/where-to-begin-prioritizing-att-ck-techniques-c535b50983f4
]-> Top ATT&CK Techniques - calculator:
https://top-attack-techniques.mitre-engenuity.org
]-> Methodology:
https://top-attack-techniques.mitre-engenuity.org/methodology
@BlueRedTeam
Medium
Where to begin? Prioritizing ATT&CK Techniques
Written by Mike Cunningham, Alexia Crumpton, Jon Baker, and Ingrid Skoog.
#Red_Team
I worked on a Red Team vs. Blue Team scenario in which I played the role of both penetration tester and SOC analyst.
https://github.com/Johnrhume/Redivivus-Inc.-e
@BlueRedTeam
I worked on a Red Team vs. Blue Team scenario in which I played the role of both penetration tester and SOC analyst.
https://github.com/Johnrhume/Redivivus-Inc.-e
@BlueRedTeam
#Red_Team
C2X-HTTP - C2/Post-Exploitation Tool For Red Teaming and Ethical Hacking [on HTTP(S)]
https://github.com/739156041qqx/nxenon7
@BlueRedTeam
C2X-HTTP - C2/Post-Exploitation Tool For Red Teaming and Ethical Hacking [on HTTP(S)]
https://github.com/739156041qqx/nxenon7
@BlueRedTeam
#Blue_Team
Evicting the Adversary:
Guidance to kick out an active attacker in your environment
https://www.huntress.com/blog/evicting-the-adversary
@BlueRedTeam
Evicting the Adversary:
Guidance to kick out an active attacker in your environment
https://www.huntress.com/blog/evicting-the-adversary
@BlueRedTeam
Huntress
Evicting the Adversary | Huntress
This blog shows how to catch an adversary moving from machine to machine, how to terminate this movement and how to evict the adversary from your network.