#Red_Team
+ scan4all - 15000+ PoCs; 20 kinds of application password crack; 7000+ Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW
https://github.com/hktalent/scan4all
+ A compact guide to network pivoting for penetration testings/CTF challenges
https://github.com/t3l3machus/pentest-pivoting
+ Authentication Bypass Techniques using SQLi, PHP, XPath, and LDAP injection
https://oxasploits.com/posts/authentication-bypass-techniques-sqli-php-xpath-ldap-tricks
@BlueRedTeam
+ scan4all - 15000+ PoCs; 20 kinds of application password crack; 7000+ Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW
https://github.com/hktalent/scan4all
+ A compact guide to network pivoting for penetration testings/CTF challenges
https://github.com/t3l3machus/pentest-pivoting
+ Authentication Bypass Techniques using SQLi, PHP, XPath, and LDAP injection
https://oxasploits.com/posts/authentication-bypass-techniques-sqli-php-xpath-ldap-tricks
@BlueRedTeam
GitHub
GitHub - GhostTroops/scan4all: Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints;…
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)... - ...
#Blue_Team
+ dnsReaper - subdomain takeover tool
https://github.com/punk-security/dnsReaper
+ Check if a PAN firewall is using the default master key when globalprotect is enabled
https://gist.github.com/rqu1/6175cb2972291fc9ac96ef18f72b792c
+ dnsReaper - subdomain takeover tool
https://github.com/punk-security/dnsReaper
+ Check if a PAN firewall is using the default master key when globalprotect is enabled
https://gist.github.com/rqu1/6175cb2972291fc9ac96ef18f72b792c
GitHub
GitHub - punk-security/dnsReaper: dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!
dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team! - punk-security/dnsReaper
#Cobalt_Strike
Original Cobalt Strike
https://github.com/sabareeshkumaresan/Cobalt_Strike_4.5_Orginal
@BlueRedTeam
Original Cobalt Strike
https://github.com/sabareeshkumaresan/Cobalt_Strike_4.5_Orginal
@BlueRedTeam
👏4
#webshell
enterprise webshell CLI to obfuscate attack patterns
https://github.com/0x3van/roflcopter
@BlueRedTeam
enterprise webshell CLI to obfuscate attack patterns
https://github.com/0x3van/roflcopter
@BlueRedTeam
#Red_Team
! UNDER CONSTRUCTION ! This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.
https://github.com/0xsyr0/Red-Team-Playbooks
@BlueRedTeam
! UNDER CONSTRUCTION ! This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.
https://github.com/0xsyr0/Red-Team-Playbooks
@BlueRedTeam
GitHub
GitHub - 0xsyr0/Red-Team-Playbooks: This repository contains cutting-edge open-source security notes and tools that will help you…
This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments. - 0xsyr0/Red-Team-Playbooks
👍2👎2🥰1
#Red_Team
Cyber Security Red Team and Blue Team
https://github.com/Telmosantana/Plano-de-Estudo-Cyber-Security
@BlueRedTeam
Cyber Security Red Team and Blue Team
https://github.com/Telmosantana/Plano-de-Estudo-Cyber-Security
@BlueRedTeam
GitHub
GitHub - Telmosantana/Plano-de-Estudo-Cyber-Security: Cyber Security Red Team and Blue Team
Cyber Security Red Team and Blue Team . Contribute to Telmosantana/Plano-de-Estudo-Cyber-Security development by creating an account on GitHub.
👍1
#Red_Team
+ Creating Processes Using System Calls
https://www.coresecurity.com/core-labs/articles/creating-processes-using-system-calls
]-> PoC: https://github.com/helpsystems/CreateProcess
+ Standalone MITM attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
https://github.com/kgretzky/evilginx2
@BlueRedTeam
+ Creating Processes Using System Calls
https://www.coresecurity.com/core-labs/articles/creating-processes-using-system-calls
]-> PoC: https://github.com/helpsystems/CreateProcess
+ Standalone MITM attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
https://github.com/kgretzky/evilginx2
@BlueRedTeam
GitHub
GitHub - fortra/CreateProcess: A small PoC that creates processes in Windows
A small PoC that creates processes in Windows. Contribute to fortra/CreateProcess development by creating an account on GitHub.
Which one are you interested in?
( Everyone should answer )
( Everyone should answer )
Anonymous Poll
65%
Red Team
16%
Blue Team
16%
Purple Team
3%
Other ....
🔥11👏1
#Red_Team
Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.
https://github.com/G37SYS73M/win_tool_hub
@BlueRedTeam
Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.
https://github.com/G37SYS73M/win_tool_hub
@BlueRedTeam
GitHub
GitHub - G37SYS73M/win_tool_hub: Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator…
Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use. - G37SYS73M/win_tool_hub
🔥2👍1
#Blue_Team
+ PICT - Post-Infection Collection Toolkit
https://github.com/thomasareed/pict
+ Powershell noscript to hunt persistences implanted in Windows machines
https://github.com/last-byte/PersistenceSniper
+ PICT - Post-Infection Collection Toolkit
https://github.com/thomasareed/pict
+ Powershell noscript to hunt persistences implanted in Windows machines
https://github.com/last-byte/PersistenceSniper
GitHub
GitHub - thomasareed/pict: Post-Infection Collection Toolkit
Post-Infection Collection Toolkit. Contribute to thomasareed/pict development by creating an account on GitHub.
#Red_Team
Backdooring Office Structures
Part 1 - The Oldschool
https://mgeeky.tech/backdooring-office-structures-part-1-oldschool
Part 2 - Payload Crumbs In Custom Parts
https://mgeeky.tech/payload-crumbs-in-custom-parts
@BlueRedTeam
Backdooring Office Structures
Part 1 - The Oldschool
https://mgeeky.tech/backdooring-office-structures-part-1-oldschool
Part 2 - Payload Crumbs In Custom Parts
https://mgeeky.tech/payload-crumbs-in-custom-parts
@BlueRedTeam
👍1
#Red_Team
1. Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments
https://www.netspi.com/blog/technical/network-penetration-testing/network-share-permissions-powerhuntshares
2. HInvoke and avoiding PInvoke
https://dr4k0nia.github.io/dotnet/coding/2022/08/10/HInvoke-and-avoiding-PInvoke.html
@BlueRedTeam
1. Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments
https://www.netspi.com/blog/technical/network-penetration-testing/network-share-permissions-powerhuntshares
2. HInvoke and avoiding PInvoke
https://dr4k0nia.github.io/dotnet/coding/2022/08/10/HInvoke-and-avoiding-PInvoke.html
@BlueRedTeam
NetSPI
Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments
Learn how to quickly inventory, attack, and remediate network shares configured with excessive permissions assigned to SMB shares in Active Directory environments.
#Blue_Team
+ How to Secure Deployments in Kubernetes
https://www.armosec.io/blog/secure-kubernetes-deployment
+ Kubernetes Security Best Practices: Definitive Guide
https://www.armosec.io/blog/kubernetes-security-best-practices
@BlueRedTeam
+ How to Secure Deployments in Kubernetes
https://www.armosec.io/blog/secure-kubernetes-deployment
+ Kubernetes Security Best Practices: Definitive Guide
https://www.armosec.io/blog/kubernetes-security-best-practices
@BlueRedTeam
ARMO
How to secure Kubernetes Deployment? | ARMO
In this blog post, we’ll explore how to secure Kubernetes deployments and applications in general
#Red_Team
Weaponizing Carbon Lang for Red Team operation
https://github.com/ArchonLabs/Offensive-Carbon
@BlueRedTeam
Weaponizing Carbon Lang for Red Team operation
https://github.com/ArchonLabs/Offensive-Carbon
@BlueRedTeam
GitHub
GitHub - ArchonLabs/Offensive-Carbon: Weaponizing Carbon Lang for Red Team operation
Weaponizing Carbon Lang for Red Team operation. Contribute to ArchonLabs/Offensive-Carbon development by creating an account on GitHub.