Red Blue Team – Telegram
Red Blue Team
5.02K subscribers
38 photos
5 videos
33 files
1.43K links
-> 20 June 2019

]-> RedTeam | BlueTeam | Pentest

[-> Blue Team @BlueTeamKit
Download Telegram
#Cobalt_Strike

​​Crypt-Cobalt-Strike-Powershell

Privat crypt Cobalt Strike and powershell

https://github.com/trewisscotch/Crypt-Cobalt-Strike-Powershell

@BlueRedTeam
👍2
#Red_Team

Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL). Mangle can remove known Indicators of Compromise (IoC) based strings and replace them with random characters, change the file by inflating the size to avoid EDRs, and can clone code-signing certs from legitimate files. In doing so, Mangle helps loaders evade on-disk and in-memory scanners.

https://github.com/optiv/Mangle

@BlueRedTeam
#Red_Team

​​SharpSniper

Often a Red Team engagement is more than just achieving Domain Admin. Some clients will want to see if specific users in the domain can be compromised, for example the CEO.

SharpSniper is a simple tool to find the IP address of these users so that you can target their box.

It requires that you have privileges to read logs on Domain Controllers.

First it queries and makes a list of Domain contollers, then search for Log-on events on any of the DCs for the user you are looking for and then reads the most recent DHCP allocated logon IP address.

https://github.com/HunnicCyber/SharpSniper

@BlueRedTeam
👍3
#Cobalt_Strike

​​kernel-mii

Cobalt Strike Beacon Object File foundation for kernel exploitation using CVE-2021-21551.

This is a Cobalt Strike (CS) Beacon Object File (BOF) which exploits CVE-2021-21551. It only overwrites the beacon process token with the system process token. But this BOF is mostly just a good foundation for further kernel exploitation via CS.

https://github.com/tijme/kernel-mii

@BlueRedTeam
#CVE-2022

CVE-2022-24500 Windows SMB Remote Code Execution Vulnerability

https://github.com/Daro1967/CVE-2022-24500-RCE

@BlueRedTeam
👎1
#CVE-2022

Verifed Proof of Concept on CVE-2022-24086 RCE

https://github.com/Cory65/CVE-2022-24086-POC

@BlueRedTeam
#Cobalt_Strike

kernel-mii

Cobalt Strike Beacon Object File foundation for kernel exploitation using CVE-2021-21551.

This is a Cobalt Strike (CS) Beacon Object File (BOF) which exploits CVE-2021-21551. It only overwrites the beacon process token with the system process token. But this BOF is mostly just a good foundation for further kernel exploitation via CS.

https://github.com/NorthwaveSecurity/kernel-mii


@BlueRedTeam
👍3
#Red_Team

Red Team infrastructure as code to perform local pentesting

https://github.com/N1neKitsune/_

@BlueRedTeam
👎5