Red Blue Team – Telegram
Red Blue Team
5.02K subscribers
38 photos
5 videos
33 files
1.43K links
-> 20 June 2019

]-> RedTeam | BlueTeam | Pentest

[-> Blue Team @BlueTeamKit
Download Telegram
PoshC2

A proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral movement.

PoshC2 is primarily written in Python3 and follows a modular format to enable users to add their own modules and tools, allowing an extendible and flexible C2 framework.

Out-of-the-box PoshC2 comes PowerShell/C# and Python2/Python3 implants with payloads written in PowerShell v2 and v4, C++ and C# source code, a variety of executables, DLLs and raw shellcode in addition to a Python2/Python3 payload. These enable C2 functionality on a wide range of devices and operating systems, including Windows, *nix and OSX.

https://github.com/nettitude/PoshC2

Documentation:
https://poshc2.readthedocs.io/en/latest/

@BlueRedTeam
👍2
#Cobalt_Strike

​​Crypt-Cobalt-Strike-Powershell

Privat crypt Cobalt Strike and powershell

https://github.com/trewisscotch/Crypt-Cobalt-Strike-Powershell

@BlueRedTeam
👍2
#Red_Team

Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL). Mangle can remove known Indicators of Compromise (IoC) based strings and replace them with random characters, change the file by inflating the size to avoid EDRs, and can clone code-signing certs from legitimate files. In doing so, Mangle helps loaders evade on-disk and in-memory scanners.

https://github.com/optiv/Mangle

@BlueRedTeam
#Red_Team

​​SharpSniper

Often a Red Team engagement is more than just achieving Domain Admin. Some clients will want to see if specific users in the domain can be compromised, for example the CEO.

SharpSniper is a simple tool to find the IP address of these users so that you can target their box.

It requires that you have privileges to read logs on Domain Controllers.

First it queries and makes a list of Domain contollers, then search for Log-on events on any of the DCs for the user you are looking for and then reads the most recent DHCP allocated logon IP address.

https://github.com/HunnicCyber/SharpSniper

@BlueRedTeam
👍3
#Cobalt_Strike

​​kernel-mii

Cobalt Strike Beacon Object File foundation for kernel exploitation using CVE-2021-21551.

This is a Cobalt Strike (CS) Beacon Object File (BOF) which exploits CVE-2021-21551. It only overwrites the beacon process token with the system process token. But this BOF is mostly just a good foundation for further kernel exploitation via CS.

https://github.com/tijme/kernel-mii

@BlueRedTeam
#CVE-2022

CVE-2022-24500 Windows SMB Remote Code Execution Vulnerability

https://github.com/Daro1967/CVE-2022-24500-RCE

@BlueRedTeam
👎1