Red Blue Team – Telegram
Red Blue Team
5.02K subscribers
38 photos
5 videos
33 files
1.43K links
-> 20 June 2019

]-> RedTeam | BlueTeam | Pentest

[-> Blue Team @BlueTeamKit
Download Telegram
#Red_Team

Red Teaming Active Directory

When delivering an advanced penetration test or red team exercise, we want our activities to look like normal actions. Not only we will be stealthy this way, but we will minimize the posssibilities of disrupting normal operations as well.

https://h4ms1k.github.io/Red_Team_Active_Directory/

@BlueRedTeam
#CVE-2022

metasploit and python module for CVE-2022-26809 windows rpc rce via smb 445

https://github.com/Ziggy78/CVE-2022-26809-RCE

@BlueRedTeam
#Cobalt_Strike

Public variation of Titan Loader. Tweaks Cobalt Strike's behavior with Import Address Table Hooks

https://github.com/SecIdiot/TitanLdr

@BlueRedTeam
#Red_Team

A framework for visualizing data source coverage, Atomic Red Team test results, and adversary techniques coverage

https://github.com/ColeStrickler/Vizual1zer

@BlueRedTeam
PoshC2

A proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral movement.

PoshC2 is primarily written in Python3 and follows a modular format to enable users to add their own modules and tools, allowing an extendible and flexible C2 framework.

Out-of-the-box PoshC2 comes PowerShell/C# and Python2/Python3 implants with payloads written in PowerShell v2 and v4, C++ and C# source code, a variety of executables, DLLs and raw shellcode in addition to a Python2/Python3 payload. These enable C2 functionality on a wide range of devices and operating systems, including Windows, *nix and OSX.

https://github.com/nettitude/PoshC2

Documentation:
https://poshc2.readthedocs.io/en/latest/

@BlueRedTeam
👍2