#Cobalt_Strike
Original Cobalt Strike
https://github.com/sabareeshkumaresan/Cobalt_Strike_4.5_Orginal
@BlueRedTeam
Original Cobalt Strike
https://github.com/sabareeshkumaresan/Cobalt_Strike_4.5_Orginal
@BlueRedTeam
👏4
#webshell
enterprise webshell CLI to obfuscate attack patterns
https://github.com/0x3van/roflcopter
@BlueRedTeam
enterprise webshell CLI to obfuscate attack patterns
https://github.com/0x3van/roflcopter
@BlueRedTeam
#Red_Team
! UNDER CONSTRUCTION ! This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.
https://github.com/0xsyr0/Red-Team-Playbooks
@BlueRedTeam
! UNDER CONSTRUCTION ! This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.
https://github.com/0xsyr0/Red-Team-Playbooks
@BlueRedTeam
GitHub
GitHub - 0xsyr0/Red-Team-Playbooks: This repository contains cutting-edge open-source security notes and tools that will help you…
This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments. - 0xsyr0/Red-Team-Playbooks
👍2👎2🥰1
#Red_Team
Cyber Security Red Team and Blue Team
https://github.com/Telmosantana/Plano-de-Estudo-Cyber-Security
@BlueRedTeam
Cyber Security Red Team and Blue Team
https://github.com/Telmosantana/Plano-de-Estudo-Cyber-Security
@BlueRedTeam
GitHub
GitHub - Telmosantana/Plano-de-Estudo-Cyber-Security: Cyber Security Red Team and Blue Team
Cyber Security Red Team and Blue Team . Contribute to Telmosantana/Plano-de-Estudo-Cyber-Security development by creating an account on GitHub.
👍1
#Red_Team
+ Creating Processes Using System Calls
https://www.coresecurity.com/core-labs/articles/creating-processes-using-system-calls
]-> PoC: https://github.com/helpsystems/CreateProcess
+ Standalone MITM attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
https://github.com/kgretzky/evilginx2
@BlueRedTeam
+ Creating Processes Using System Calls
https://www.coresecurity.com/core-labs/articles/creating-processes-using-system-calls
]-> PoC: https://github.com/helpsystems/CreateProcess
+ Standalone MITM attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
https://github.com/kgretzky/evilginx2
@BlueRedTeam
GitHub
GitHub - fortra/CreateProcess: A small PoC that creates processes in Windows
A small PoC that creates processes in Windows. Contribute to fortra/CreateProcess development by creating an account on GitHub.
Which one are you interested in?
( Everyone should answer )
( Everyone should answer )
Anonymous Poll
65%
Red Team
16%
Blue Team
16%
Purple Team
3%
Other ....
🔥11👏1
#Red_Team
Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.
https://github.com/G37SYS73M/win_tool_hub
@BlueRedTeam
Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.
https://github.com/G37SYS73M/win_tool_hub
@BlueRedTeam
GitHub
GitHub - G37SYS73M/win_tool_hub: Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator…
Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use. - G37SYS73M/win_tool_hub
🔥2👍1
#Blue_Team
+ PICT - Post-Infection Collection Toolkit
https://github.com/thomasareed/pict
+ Powershell noscript to hunt persistences implanted in Windows machines
https://github.com/last-byte/PersistenceSniper
+ PICT - Post-Infection Collection Toolkit
https://github.com/thomasareed/pict
+ Powershell noscript to hunt persistences implanted in Windows machines
https://github.com/last-byte/PersistenceSniper
GitHub
GitHub - thomasareed/pict: Post-Infection Collection Toolkit
Post-Infection Collection Toolkit. Contribute to thomasareed/pict development by creating an account on GitHub.
#Red_Team
Backdooring Office Structures
Part 1 - The Oldschool
https://mgeeky.tech/backdooring-office-structures-part-1-oldschool
Part 2 - Payload Crumbs In Custom Parts
https://mgeeky.tech/payload-crumbs-in-custom-parts
@BlueRedTeam
Backdooring Office Structures
Part 1 - The Oldschool
https://mgeeky.tech/backdooring-office-structures-part-1-oldschool
Part 2 - Payload Crumbs In Custom Parts
https://mgeeky.tech/payload-crumbs-in-custom-parts
@BlueRedTeam
👍1
#Red_Team
1. Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments
https://www.netspi.com/blog/technical/network-penetration-testing/network-share-permissions-powerhuntshares
2. HInvoke and avoiding PInvoke
https://dr4k0nia.github.io/dotnet/coding/2022/08/10/HInvoke-and-avoiding-PInvoke.html
@BlueRedTeam
1. Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments
https://www.netspi.com/blog/technical/network-penetration-testing/network-share-permissions-powerhuntshares
2. HInvoke and avoiding PInvoke
https://dr4k0nia.github.io/dotnet/coding/2022/08/10/HInvoke-and-avoiding-PInvoke.html
@BlueRedTeam
NetSPI
Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments
Learn how to quickly inventory, attack, and remediate network shares configured with excessive permissions assigned to SMB shares in Active Directory environments.
#Blue_Team
+ How to Secure Deployments in Kubernetes
https://www.armosec.io/blog/secure-kubernetes-deployment
+ Kubernetes Security Best Practices: Definitive Guide
https://www.armosec.io/blog/kubernetes-security-best-practices
@BlueRedTeam
+ How to Secure Deployments in Kubernetes
https://www.armosec.io/blog/secure-kubernetes-deployment
+ Kubernetes Security Best Practices: Definitive Guide
https://www.armosec.io/blog/kubernetes-security-best-practices
@BlueRedTeam
ARMO
How to secure Kubernetes Deployment? | ARMO
In this blog post, we’ll explore how to secure Kubernetes deployments and applications in general
#Red_Team
Weaponizing Carbon Lang for Red Team operation
https://github.com/ArchonLabs/Offensive-Carbon
@BlueRedTeam
Weaponizing Carbon Lang for Red Team operation
https://github.com/ArchonLabs/Offensive-Carbon
@BlueRedTeam
GitHub
GitHub - ArchonLabs/Offensive-Carbon: Weaponizing Carbon Lang for Red Team operation
Weaponizing Carbon Lang for Red Team operation. Contribute to ArchonLabs/Offensive-Carbon development by creating an account on GitHub.
#Blue_Team
Detectree
A data visualisation tool for blue teams. It provides a graphical representation of detection data, which allows an analyst generate almost instant opinions about the nature of the underlying activity and to understand complex relationships between the data points.
Ultimately, this can help reduce response time, reduce alert fatigue and facilitate communication between analysts within the teams.
https://github.com/countercept/detectree
@BlueRedTeam
Detectree
A data visualisation tool for blue teams. It provides a graphical representation of detection data, which allows an analyst generate almost instant opinions about the nature of the underlying activity and to understand complex relationships between the data points.
Ultimately, this can help reduce response time, reduce alert fatigue and facilitate communication between analysts within the teams.
https://github.com/countercept/detectree
@BlueRedTeam
👍4
#Red_Team
A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
https://github.com/layer8secure/The-Storfield-Methodology
@BlueRedTeam
A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village.
https://github.com/layer8secure/The-Storfield-Methodology
@BlueRedTeam
GitHub
GitHub - layer8secure/The-Storfield-Methodology: A methodology to formulate attack paths in a quiet manner using a back-to-basics…
A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Village. - GitHub - layer8secure/The-Storfield-Methodology: A met...
👍1