#Red_Team
Automation For Metova Range Global Internet system Red Team Infastructure
https://github.com/chipmanfu/RGI-redteam-noscripts
@BlueRedTeam
Automation For Metova Range Global Internet system Red Team Infastructure
https://github.com/chipmanfu/RGI-redteam-noscripts
@BlueRedTeam
GitHub
GitHub - chipmanfu/RGI-redteam-noscripts: Automation For Metova Range Global Internet system Red Team Infastructure
Automation For Metova Range Global Internet system Red Team Infastructure - chipmanfu/RGI-redteam-noscripts
#Blue_Team
Elastic Security detection content for Endpoint
https://github.com/elastic/protections-artifacts
@BlueRedTeam
Elastic Security detection content for Endpoint
https://github.com/elastic/protections-artifacts
@BlueRedTeam
GitHub
GitHub - elastic/protections-artifacts: Elastic Security detection content for Endpoint
Elastic Security detection content for Endpoint. Contribute to elastic/protections-artifacts development by creating an account on GitHub.
❤3
#Cobalt_Strike
Public variation of Titan Loader. Tweaks Cobalt Strike's behavior with Import Address Table Hooks
https://github.com/SecIdiot/TitanLdr
@BlueRedTeam
Public variation of Titan Loader. Tweaks Cobalt Strike's behavior with Import Address Table Hooks
https://github.com/SecIdiot/TitanLdr
@BlueRedTeam
#Red_Team
1. A python noscript that exploits wget when being set with a SUID bit, and overwrites the root password
https://github.com/CopernicusPY/wget-root
2. Abused RPC method allows privileged processes to access malicious pipes for exploitation
https://github.com/crisprss/magicNetdefs
@BlueRedTeam
1. A python noscript that exploits wget when being set with a SUID bit, and overwrites the root password
https://github.com/CopernicusPY/wget-root
2. Abused RPC method allows privileged processes to access malicious pipes for exploitation
https://github.com/crisprss/magicNetdefs
@BlueRedTeam
GitHub
GitHub - lil-skelly/wget-root: This is a python noscript that exploits wget when being set with a SUID bit, and overwrites the root…
This is a python noscript that exploits wget when being set with a SUID bit, and overwrites the root password. - lil-skelly/wget-root
#Red_Team
+ scan4all - 15000+ PoCs; 20 kinds of application password crack; 7000+ Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW
https://github.com/hktalent/scan4all
+ A compact guide to network pivoting for penetration testings/CTF challenges
https://github.com/t3l3machus/pentest-pivoting
+ Authentication Bypass Techniques using SQLi, PHP, XPath, and LDAP injection
https://oxasploits.com/posts/authentication-bypass-techniques-sqli-php-xpath-ldap-tricks
@BlueRedTeam
+ scan4all - 15000+ PoCs; 20 kinds of application password crack; 7000+ Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW
https://github.com/hktalent/scan4all
+ A compact guide to network pivoting for penetration testings/CTF challenges
https://github.com/t3l3machus/pentest-pivoting
+ Authentication Bypass Techniques using SQLi, PHP, XPath, and LDAP injection
https://oxasploits.com/posts/authentication-bypass-techniques-sqli-php-xpath-ldap-tricks
@BlueRedTeam
GitHub
GitHub - GhostTroops/scan4all: Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints;…
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)... - ...
#Blue_Team
+ dnsReaper - subdomain takeover tool
https://github.com/punk-security/dnsReaper
+ Check if a PAN firewall is using the default master key when globalprotect is enabled
https://gist.github.com/rqu1/6175cb2972291fc9ac96ef18f72b792c
+ dnsReaper - subdomain takeover tool
https://github.com/punk-security/dnsReaper
+ Check if a PAN firewall is using the default master key when globalprotect is enabled
https://gist.github.com/rqu1/6175cb2972291fc9ac96ef18f72b792c
GitHub
GitHub - punk-security/dnsReaper: dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!
dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team! - punk-security/dnsReaper
#Cobalt_Strike
Original Cobalt Strike
https://github.com/sabareeshkumaresan/Cobalt_Strike_4.5_Orginal
@BlueRedTeam
Original Cobalt Strike
https://github.com/sabareeshkumaresan/Cobalt_Strike_4.5_Orginal
@BlueRedTeam
👏4
#webshell
enterprise webshell CLI to obfuscate attack patterns
https://github.com/0x3van/roflcopter
@BlueRedTeam
enterprise webshell CLI to obfuscate attack patterns
https://github.com/0x3van/roflcopter
@BlueRedTeam
#Red_Team
! UNDER CONSTRUCTION ! This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.
https://github.com/0xsyr0/Red-Team-Playbooks
@BlueRedTeam
! UNDER CONSTRUCTION ! This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.
https://github.com/0xsyr0/Red-Team-Playbooks
@BlueRedTeam
GitHub
GitHub - 0xsyr0/Red-Team-Playbooks: This repository contains cutting-edge open-source security notes and tools that will help you…
This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments. - 0xsyr0/Red-Team-Playbooks
👍2👎2🥰1
#Red_Team
Cyber Security Red Team and Blue Team
https://github.com/Telmosantana/Plano-de-Estudo-Cyber-Security
@BlueRedTeam
Cyber Security Red Team and Blue Team
https://github.com/Telmosantana/Plano-de-Estudo-Cyber-Security
@BlueRedTeam
GitHub
GitHub - Telmosantana/Plano-de-Estudo-Cyber-Security: Cyber Security Red Team and Blue Team
Cyber Security Red Team and Blue Team . Contribute to Telmosantana/Plano-de-Estudo-Cyber-Security development by creating an account on GitHub.
👍1
#Red_Team
+ Creating Processes Using System Calls
https://www.coresecurity.com/core-labs/articles/creating-processes-using-system-calls
]-> PoC: https://github.com/helpsystems/CreateProcess
+ Standalone MITM attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
https://github.com/kgretzky/evilginx2
@BlueRedTeam
+ Creating Processes Using System Calls
https://www.coresecurity.com/core-labs/articles/creating-processes-using-system-calls
]-> PoC: https://github.com/helpsystems/CreateProcess
+ Standalone MITM attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
https://github.com/kgretzky/evilginx2
@BlueRedTeam
GitHub
GitHub - fortra/CreateProcess: A small PoC that creates processes in Windows
A small PoC that creates processes in Windows. Contribute to fortra/CreateProcess development by creating an account on GitHub.
Which one are you interested in?
( Everyone should answer )
( Everyone should answer )
Anonymous Poll
65%
Red Team
16%
Blue Team
16%
Purple Team
3%
Other ....
🔥11👏1
#Red_Team
Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.
https://github.com/G37SYS73M/win_tool_hub
@BlueRedTeam
Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.
https://github.com/G37SYS73M/win_tool_hub
@BlueRedTeam
GitHub
GitHub - G37SYS73M/win_tool_hub: Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator…
Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use. - G37SYS73M/win_tool_hub
🔥2👍1
#Blue_Team
+ PICT - Post-Infection Collection Toolkit
https://github.com/thomasareed/pict
+ Powershell noscript to hunt persistences implanted in Windows machines
https://github.com/last-byte/PersistenceSniper
+ PICT - Post-Infection Collection Toolkit
https://github.com/thomasareed/pict
+ Powershell noscript to hunt persistences implanted in Windows machines
https://github.com/last-byte/PersistenceSniper
GitHub
GitHub - thomasareed/pict: Post-Infection Collection Toolkit
Post-Infection Collection Toolkit. Contribute to thomasareed/pict development by creating an account on GitHub.