#Cobalt_Strike
Script to download (licenced) Cobalt Strike in oficial website and install on server Ubuntu.
https://github.com/andreluna/cobaltstrike-auto-install
@BlueRedTeam
Script to download (licenced) Cobalt Strike in oficial website and install on server Ubuntu.
https://github.com/andreluna/cobaltstrike-auto-install
@BlueRedTeam
GitHub
GitHub - andreluna/cobaltstrike-auto-install: Script to download (licenced) Cobalt Strike in oficial website and install on server…
Script to download (licenced) Cobalt Strike in oficial website and install on server Ubuntu. - andreluna/cobaltstrike-auto-install
The first step in a targeted attack – or a penetration test or red team activity – is gathering intelligence on the target. While there are ways and means to do this covertly, intelligence gathering usually starts with scraping information from public sources, collectively known as open source intelligence or OSINT. There is such a wealth of legally collectible OSINT available now thanks to social media and the prevalence of online activities that this may be all that is required to give an attacker everything they need to successfully profile an organization or individual.
In this Channel , we’ll get you up to speed on what OSINT is all about and how you can learn to use OSINT tools to better understand your own digital footprint.
Join : @OsintBlackBox
In this Channel , we’ll get you up to speed on what OSINT is all about and how you can learn to use OSINT tools to better understand your own digital footprint.
Join : @OsintBlackBox
❤5
#Cobalt_Strike
An aggressor noscript for Cobalt Strike to query Windows' GetLastError messages
https://github.com/Henkru/cs-get-last-error
@BlueRedTeam
An aggressor noscript for Cobalt Strike to query Windows' GetLastError messages
https://github.com/Henkru/cs-get-last-error
@BlueRedTeam
GitHub
GitHub - Henkru/cs-get-last-error: An aggressor noscript for Cobalt Strike to query Windows' GetLastError messages
An aggressor noscript for Cobalt Strike to query Windows' GetLastError messages - Henkru/cs-get-last-error
#Red_Team
HacktheBox Synack Red Team Assessment Writeups | Host | Web | Mobile
https://github.com/tiber10/Italian-Collegiate-Programming-Contest-2022
@BlueRedTeam
HacktheBox Synack Red Team Assessment Writeups | Host | Web | Mobile
https://github.com/tiber10/Italian-Collegiate-Programming-Contest-2022
@BlueRedTeam
GitHub
GitHub - tiber10/Italian-Collegiate-Programming-Contest-2022: In this repository you will find the problemset and the solutions…
In this repository you will find the problemset and the solutions of The Italian Collegiate Programming Contest 2022 that was held on January 12th, 2022 Online. I participated as a member of Sapien...
👎2
#Red_Team
Offensive Security | Red Team
https://github.com/DFIRSECPublicLibrary/Atomic-Red-Team-Plans
@BlueRedTeam
Offensive Security | Red Team
https://github.com/DFIRSECPublicLibrary/Atomic-Red-Team-Plans
@BlueRedTeam
#Cobalt_Strike
An aggressor noscript for Cobalt Strike to query Windows' GetLastError messages
https://github.com/CrossC2/CrossC2Kit
@BlueRedTeam
An aggressor noscript for Cobalt Strike to query Windows' GetLastError messages
https://github.com/CrossC2/CrossC2Kit
@BlueRedTeam
GitHub
GitHub - CrossC2/CrossC2Kit: CrossC2 developed based on the Cobalt Strike framework can be used for other cross-platform system…
CrossC2 developed based on the Cobalt Strike framework can be used for other cross-platform system control. CrossC2Kit provides some interfaces for users to call to manipulate the CrossC2 Beacon se...
#PurpleTeam
CLI component of #OWASP PurpleTeam.
https://github.com/purpleteam-labs/purpleteam
@BlueRedTeam
CLI component of #OWASP PurpleTeam.
https://github.com/purpleteam-labs/purpleteam
@BlueRedTeam
GitHub
GitHub - purpleteam-labs/purpleteam: CLI component of OWASP PurpleTeam
CLI component of OWASP PurpleTeam. Contribute to purpleteam-labs/purpleteam development by creating an account on GitHub.
#Red_Team
List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting point.
https://github.com/0xMrNiko/Awesome-Red-Teaming
@BlueRedTeam
List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting point.
https://github.com/0xMrNiko/Awesome-Red-Teaming
@BlueRedTeam
GitHub
GitHub - 0xMrNiko/Awesome-Red-Teaming: List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn…
List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting point. - 0xMrNiko/Awesome-Red-Teaming
#Red_Team
Automation For Metova Range Global Internet system Red Team Infastructure
https://github.com/chipmanfu/RGI-redteam-noscripts
@BlueRedTeam
Automation For Metova Range Global Internet system Red Team Infastructure
https://github.com/chipmanfu/RGI-redteam-noscripts
@BlueRedTeam
GitHub
GitHub - chipmanfu/RGI-redteam-noscripts: Automation For Metova Range Global Internet system Red Team Infastructure
Automation For Metova Range Global Internet system Red Team Infastructure - chipmanfu/RGI-redteam-noscripts
#Blue_Team
Elastic Security detection content for Endpoint
https://github.com/elastic/protections-artifacts
@BlueRedTeam
Elastic Security detection content for Endpoint
https://github.com/elastic/protections-artifacts
@BlueRedTeam
GitHub
GitHub - elastic/protections-artifacts: Elastic Security detection content for Endpoint
Elastic Security detection content for Endpoint. Contribute to elastic/protections-artifacts development by creating an account on GitHub.
❤3
#Cobalt_Strike
Public variation of Titan Loader. Tweaks Cobalt Strike's behavior with Import Address Table Hooks
https://github.com/SecIdiot/TitanLdr
@BlueRedTeam
Public variation of Titan Loader. Tweaks Cobalt Strike's behavior with Import Address Table Hooks
https://github.com/SecIdiot/TitanLdr
@BlueRedTeam
#Red_Team
1. A python noscript that exploits wget when being set with a SUID bit, and overwrites the root password
https://github.com/CopernicusPY/wget-root
2. Abused RPC method allows privileged processes to access malicious pipes for exploitation
https://github.com/crisprss/magicNetdefs
@BlueRedTeam
1. A python noscript that exploits wget when being set with a SUID bit, and overwrites the root password
https://github.com/CopernicusPY/wget-root
2. Abused RPC method allows privileged processes to access malicious pipes for exploitation
https://github.com/crisprss/magicNetdefs
@BlueRedTeam
GitHub
GitHub - lil-skelly/wget-root: This is a python noscript that exploits wget when being set with a SUID bit, and overwrites the root…
This is a python noscript that exploits wget when being set with a SUID bit, and overwrites the root password. - lil-skelly/wget-root
#Red_Team
+ scan4all - 15000+ PoCs; 20 kinds of application password crack; 7000+ Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW
https://github.com/hktalent/scan4all
+ A compact guide to network pivoting for penetration testings/CTF challenges
https://github.com/t3l3machus/pentest-pivoting
+ Authentication Bypass Techniques using SQLi, PHP, XPath, and LDAP injection
https://oxasploits.com/posts/authentication-bypass-techniques-sqli-php-xpath-ldap-tricks
@BlueRedTeam
+ scan4all - 15000+ PoCs; 20 kinds of application password crack; 7000+ Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW
https://github.com/hktalent/scan4all
+ A compact guide to network pivoting for penetration testings/CTF challenges
https://github.com/t3l3machus/pentest-pivoting
+ Authentication Bypass Techniques using SQLi, PHP, XPath, and LDAP injection
https://oxasploits.com/posts/authentication-bypass-techniques-sqli-php-xpath-ldap-tricks
@BlueRedTeam
GitHub
GitHub - GhostTroops/scan4all: Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints;…
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)... - ...
#Blue_Team
+ dnsReaper - subdomain takeover tool
https://github.com/punk-security/dnsReaper
+ Check if a PAN firewall is using the default master key when globalprotect is enabled
https://gist.github.com/rqu1/6175cb2972291fc9ac96ef18f72b792c
+ dnsReaper - subdomain takeover tool
https://github.com/punk-security/dnsReaper
+ Check if a PAN firewall is using the default master key when globalprotect is enabled
https://gist.github.com/rqu1/6175cb2972291fc9ac96ef18f72b792c
GitHub
GitHub - punk-security/dnsReaper: dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!
dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team! - punk-security/dnsReaper
#Cobalt_Strike
Original Cobalt Strike
https://github.com/sabareeshkumaresan/Cobalt_Strike_4.5_Orginal
@BlueRedTeam
Original Cobalt Strike
https://github.com/sabareeshkumaresan/Cobalt_Strike_4.5_Orginal
@BlueRedTeam
👏4
#webshell
enterprise webshell CLI to obfuscate attack patterns
https://github.com/0x3van/roflcopter
@BlueRedTeam
enterprise webshell CLI to obfuscate attack patterns
https://github.com/0x3van/roflcopter
@BlueRedTeam