#Red_Team
Windows Privilege Escalation
Part 1 - Unquoted service paths
https://medium.com/@tinopreter/windows-privilege-escalation-1-unquoted-service-paths-975e3ea6f1e9
Part 2 - Hijacking DLLs
https://medium.com/@tinopreter/windows-privilege-escalation-2-hijacking-dlls-28505b68a978
@BlueRedTeam
Windows Privilege Escalation
Part 1 - Unquoted service paths
https://medium.com/@tinopreter/windows-privilege-escalation-1-unquoted-service-paths-975e3ea6f1e9
Part 2 - Hijacking DLLs
https://medium.com/@tinopreter/windows-privilege-escalation-2-hijacking-dlls-28505b68a978
@BlueRedTeam
Medium
Windows PrivEsc (1) — Unquoted service paths
When starting a service, Windows require the path to the service binary. And if the full path to the binary has spaces in between the…
#Red_Team
+ EtwSessionHijacking - Poc on blocking Procmon from monitoring network events
https://github.com/ORCx41/EtwSessionHijacking
+ Investigating .NET CLR Usage Log Tampering Techniques For EDR Evasion
https://bohops.com/2022/08/22/investigating-net-clr-usage-log-tampering-techniques-for-edr-evasion-part-2
@BlueRedTeam
+ EtwSessionHijacking - Poc on blocking Procmon from monitoring network events
https://github.com/ORCx41/EtwSessionHijacking
+ Investigating .NET CLR Usage Log Tampering Techniques For EDR Evasion
https://bohops.com/2022/08/22/investigating-net-clr-usage-log-tampering-techniques-for-edr-evasion-part-2
@BlueRedTeam
GitHub
GitHub - NUL0x4C/EtwSessionHijacking: A Poc on blocking Procmon from monitoring network events
A Poc on blocking Procmon from monitoring network events - NUL0x4C/EtwSessionHijacking
🏃♂️ آموزش های رایگان امنیت شبکه و تست نفوذ
✅ مقالات حوزه امنیت شبکه و تست نفوذ
🔴 پکیج های آموزشی
🔰 به همراه فیلم های آموزشی رایگان
https://news.1rj.ru/str/irsecurityworld
✅ مقالات حوزه امنیت شبکه و تست نفوذ
🔴 پکیج های آموزشی
🔰 به همراه فیلم های آموزشی رایگان
https://news.1rj.ru/str/irsecurityworld
#Red_Team #Blue_Team
MITRE ATT&CK Matrix for Kubernetes: Tactics & Techniques
Part 1
Part 2
Part 3
@BlueRedTeam
MITRE ATT&CK Matrix for Kubernetes: Tactics & Techniques
Part 1
Part 2
Part 3
@BlueRedTeam
👍2
#Red_Team
Spoofing Call Stacks To Confuse EDRs
https://labs.withsecure.com/blog/spoofing-call-stacks-to-confuse-edrs/
@BlueRedTeam
Spoofing Call Stacks To Confuse EDRs
https://labs.withsecure.com/blog/spoofing-call-stacks-to-confuse-edrs/
@BlueRedTeam
#Red_Team
Bypassing AppLocker by abusing HashInfo
https://shells.systems/post-bypassing-applocker-by-abusing-hashinfo
@BlueRedTeam
Bypassing AppLocker by abusing HashInfo
https://shells.systems/post-bypassing-applocker-by-abusing-hashinfo
@BlueRedTeam
Shells.Systems
Bypassing AppLocker by abusing HashInfo - Shells.Systems
Estimated Reading Time: 4 minutesThis article is based mostly on the work of Grzegorz Tworek (@0gtweet) I recently saw this tweet from Grzegorz Tworek (@0gtweet – who if you aren’t following you really should be!) come across my timeline I had seen previous…
#Red_Team
+ RCE on Spip and Root-Me
https://thinkloveshare.com/hacking/rce_on_spip_and_root_me
]-> v2: https://thinkloveshare.com/hacking/rce_on_spip_and_root_me_v2
+ Guide to DLL Sideloading
https://crypt0ace.github.io/posts/DLL-Sideloading
@BlueRedTeam
+ RCE on Spip and Root-Me
https://thinkloveshare.com/hacking/rce_on_spip_and_root_me
]-> v2: https://thinkloveshare.com/hacking/rce_on_spip_and_root_me_v2
+ Guide to DLL Sideloading
https://crypt0ace.github.io/posts/DLL-Sideloading
@BlueRedTeam
Thinkloveshare
RCE on Spip and Root-Me
Vulnerability research write-up on spip, the web framework used by root-me.org. The issues found goes from XSS to RCE, passing by SQLi!
#Blue_Team
Process Behaviour Anomaly Detection Using EBPF and Unsupervised-Learning Autoencoders
https://www.evilsocket.net/2022/08/15/Process-behaviour-anomaly-detection-using-eBPF-and-unsupervised-learning-Autoencoders
@BlueRedTeam
Process Behaviour Anomaly Detection Using EBPF and Unsupervised-Learning Autoencoders
https://www.evilsocket.net/2022/08/15/Process-behaviour-anomaly-detection-using-eBPF-and-unsupervised-learning-Autoencoders
@BlueRedTeam
evilsocket
Process Behaviour Anomaly Detection Using eBPF and Unsupervised-Learning Autoencoders
👍2
#Blue_Team
PersistenceSniper
Powershell noscript that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines
https://github.com/last-byte/PersistenceSniper/
@BlueRedTeam
PersistenceSniper
Powershell noscript that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines
https://github.com/last-byte/PersistenceSniper/
@BlueRedTeam
GitHub
GitHub - last-byte/PersistenceSniper: Powershell module that can be used by Blue Teams, Incident Responders and System Administrators…
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w...
👍3
Network Penetration Testing:
The people who work in this branch have a good knowledge of infrastructure and network services and the skills and tools of penetration testing, or rather, the skills and tools of hacking to find the weaknesses and vulnerabilities of different equipment and systems. and different network services use, these people must use the latest tools and methods to be able to pass through network security mechanisms to find various network weaknesses.
You can learn these contents in our channel and have access to various resources.
@NetPentesters
Persian Channel : @NetPentester
The people who work in this branch have a good knowledge of infrastructure and network services and the skills and tools of penetration testing, or rather, the skills and tools of hacking to find the weaknesses and vulnerabilities of different equipment and systems. and different network services use, these people must use the latest tools and methods to be able to pass through network security mechanisms to find various network weaknesses.
You can learn these contents in our channel and have access to various resources.
@NetPentesters
Persian Channel : @NetPentester
👎1🥰1
#Red_Team
For penetration testing / Red Team / CTF / Cybersecurity / Certifications
https://github.com/CyberSecurity2045/Pentest
@BlueRedTeam
For penetration testing / Red Team / CTF / Cybersecurity / Certifications
https://github.com/CyberSecurity2045/Pentest
@BlueRedTeam
👍5
#Cobalt_Strike
A position-independent reflective loader for Cobalt Strike
https://github.com/kyleavery/AceLdr
@BlueRedTeam
A position-independent reflective loader for Cobalt Strike
https://github.com/kyleavery/AceLdr
@BlueRedTeam
GitHub
GitHub - kyleavery/AceLdr: Cobalt Strike UDRL for memory scanner evasion.
Cobalt Strike UDRL for memory scanner evasion. Contribute to kyleavery/AceLdr development by creating an account on GitHub.
👍1
#Blue_Team
Blueteam operational triage registry hunting/forensic tool.
https://github.com/theflakes/reg_hunter
@BlueRedTeam
Blueteam operational triage registry hunting/forensic tool.
https://github.com/theflakes/reg_hunter
@BlueRedTeam
GitHub
GitHub - theflakes/reg_hunter: Blueteam operational triage registry hunting/forensic tool.
Blueteam operational triage registry hunting/forensic tool. - theflakes/reg_hunter
👏2❤1
#Red_Team
+ UAC Bypass by abusing RPC and debug objects
https://github.com/Kudaes/Elevator
+ Automated Red Team Infrastructure deployement using Docker
https://github.com/khast3x/Redcloud
+ Nmap's XML result parse and NVD's CPE correlation to search CVE
https://github.com/CoolerVoid/Vision2
@BlueRedTeam
+ UAC Bypass by abusing RPC and debug objects
https://github.com/Kudaes/Elevator
+ Automated Red Team Infrastructure deployement using Docker
https://github.com/khast3x/Redcloud
+ Nmap's XML result parse and NVD's CPE correlation to search CVE
https://github.com/CoolerVoid/Vision2
@BlueRedTeam
GitHub
GitHub - Kudaes/Elevator: UAC bypass by abusing RPC and debug objects.
UAC bypass by abusing RPC and debug objects. Contribute to Kudaes/Elevator development by creating an account on GitHub.
👍2
#Red_Team
+ Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javanoscript code
https://github.com/evilsocket/jscythe
+ BlazingFast DoS method (updated 2022):
Newest version of a BlazingFast bypass
https://github.com/0x44F/blazingfast-dos-updated
@BlueRedTeam
+ Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javanoscript code
https://github.com/evilsocket/jscythe
+ BlazingFast DoS method (updated 2022):
Newest version of a BlazingFast bypass
https://github.com/0x44F/blazingfast-dos-updated
@BlueRedTeam
GitHub
GitHub - evilsocket/jscythe: Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute…
Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javanoscript code. - evilsocket/jscythe
#Red_Team
Bypassing Intel CET with Counterfeit Objects
https://www.offensive-security.com/offsec/bypassing-intel-cet-with-counterfeit-objects
https://gitlab.com/offensive-security/blog/COOP
@BlueRedTeam
Bypassing Intel CET with Counterfeit Objects
https://www.offensive-security.com/offsec/bypassing-intel-cet-with-counterfeit-objects
https://gitlab.com/offensive-security/blog/COOP
@BlueRedTeam
OffSec
Bypassing Intel CET with Counterfeit Objects
In this blog, we’ll briefly cover how CFI mitigations works, including CET, and how we can leverage COOP to effectively bypass Intel CET on the latest Windows releases.
👍1
#Red_Team
+ Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key
https://github.com/hackerhouse-opensource/MsSettingsDelegateExecute
+ UAC bypass for x64 Windows 7-11
https://github.com/zha0gongz1/iscsicpl_bypassUAC
@BlueRedTeam
+ Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key
https://github.com/hackerhouse-opensource/MsSettingsDelegateExecute
+ UAC bypass for x64 Windows 7-11
https://github.com/zha0gongz1/iscsicpl_bypassUAC
@BlueRedTeam
GitHub
GitHub - hackerhouse-opensource/MsSettingsDelegateExecute: Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry…
Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key. - hackerhouse-opensource/MsSettingsDelegateExecute
🔥2
#Red_Team
+ Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC bypass (Win7+)
https://github.com/hackerhouse-opensource/ColorDataProxyUACBypass
+ evilginx2 + gophish
https://github.com/fin3ss3g0d/evilgophish
@BlueRedTeam
+ Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC bypass (Win7+)
https://github.com/hackerhouse-opensource/ColorDataProxyUACBypass
+ evilginx2 + gophish
https://github.com/fin3ss3g0d/evilgophish
@BlueRedTeam
GitHub
GitHub - hackerhouse-opensource/ColorDataProxyUACBypass: Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing…
Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC bypass. Win 7 & up. - hackerhouse-opensource/ColorDat...
#Blue_Team
Windows Security Updates for Hackers
https://blog.bitsadmin.com/blog/windows-security-updates-for-hackers
]-> Windows Exploit Suggester - Next Generation (WES-NG) - A python noscript to analyze systeminfo utility output (WinXP-11):
https://github.com/bitsadmin/wesng
@BlueRedTeam
Windows Security Updates for Hackers
https://blog.bitsadmin.com/blog/windows-security-updates-for-hackers
]-> Windows Exploit Suggester - Next Generation (WES-NG) - A python noscript to analyze systeminfo utility output (WinXP-11):
https://github.com/bitsadmin/wesng
@BlueRedTeam
BITSADMIN Blog
Windows Security Updates for Hackers
Windows versions, releases and patch levels are a rather complex matter. This post brings structure in how Windows versioning and patching works and how to identify which vulnerabilities a Windows installation is vulnerable to.
👍3🥰1
#Blue_Team
PersistenceSniper
Powershell noscript that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. The noscript is also available on Powershell Gallery.
https://github.com/last-byte/PersistenceSniper
@BlueRedTeam
PersistenceSniper
Powershell noscript that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. The noscript is also available on Powershell Gallery.
https://github.com/last-byte/PersistenceSniper
@BlueRedTeam
GitHub
GitHub - last-byte/PersistenceSniper: Powershell module that can be used by Blue Teams, Incident Responders and System Administrators…
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w...
#Red_Team
Certipy
Certipy is an offensive tool for enumerating and abusing Active Directory Certificate Services (AD CS).
If you're not familiar with AD CS and the various domain escalation techniques, I highly recommend reading Certified Pre-Owned by Will Schroeder and Lee Christensen.
https://github.com/ly4k/Certipy
Certipy 4.0: ESC9 & ESC10, BloodHound GUI, New Authentication and Request Methods — and more!: https://research.ifcr.dk/7237d88061f7
@BlueRedTeam
Certipy
Certipy is an offensive tool for enumerating and abusing Active Directory Certificate Services (AD CS).
If you're not familiar with AD CS and the various domain escalation techniques, I highly recommend reading Certified Pre-Owned by Will Schroeder and Lee Christensen.
https://github.com/ly4k/Certipy
Certipy 4.0: ESC9 & ESC10, BloodHound GUI, New Authentication and Request Methods — and more!: https://research.ifcr.dk/7237d88061f7
@BlueRedTeam
GitHub
GitHub - ly4k/Certipy: Tool for Active Directory Certificate Services enumeration and abuse
Tool for Active Directory Certificate Services enumeration and abuse - ly4k/Certipy