Red Blue Team – Telegram
Red Blue Team
5.02K subscribers
38 photos
5 videos
33 files
1.43K links
-> 20 June 2019

]-> RedTeam | BlueTeam | Pentest

[-> Blue Team @BlueTeamKit
Download Telegram
Red Blue Team pinned Deleted message
#Red_Team
Environment configuration for Red Team Cyber Security testings and tasks

https://github.com/zackjmccann/red-team-security

@BlueRedTeam
#Red_Team

RedEye is an open-source analytic tool developed by CISA and DOE’s Pacific Northwest National Laboratory to assist Red Teams with visualizing and reporting command and control activities. This tool, released in October 2022 on GitHub, allows an operator to assess and display complex data, evaluate mitigation strategies, and enable effective decision making in response to a Red Team assessment.

The tool parses logs, such as those from Cobalt Strike, and presents the data in an easily digestible format. The users can then tag and add comments to activities displayed within the tool. The operators can use the RedEye’s presentation mode to present findings and workflow to stakeholders.

https://github.com/cisagov/RedEye

@BlueRedTeam
#Red_Team

Template-Driven AV/EDR Evasion Framework.

Modern Penetration Testing and Red Teaming often require bypassing common AV/EDR appliances in order to execute code on a target. With time, defenses are becoming more complex and inherently more difficult to bypass consistently.

Inceptor is a tool that can help to automate a great part of this process, hopefully requiring no further effort.

Inceptor is a template-based PE packer for Windows, designed to help penetration testers and red teamers to bypass common AV and EDR solutions. Inceptor has been designed with a focus on usability, and to allow extensive user customization.

https://github.com/klezVirus/inceptor

@BlueRedTeam
👍3
#Purple_Team

Codecepticon is a .NET application that allows you to obfuscate C#, VBA/VB6 (macros), and PowerShell source code, and is developed for offensive security engagements such as Red/Purple Teams.

What separates Codecepticon from other obfuscators is that it targets the source code rather than the compiled executables, and was developed specifically for AV/EDR evasion

https://github.com/Accenture/Codecepticon

@BlueRedTeam
#CVE-2022

TOP All bugbounty pentesting CVE-2022- POC Exp  RCE example payload  Things

https://github.com/privatenets/Discord-Image-Token-Password-Grabber-Exploit-Cve-2022

@BlueRedTeam
#Red_Team
​​RedTeam-OffensiveSecurity

Tools & Interesting Things for RedTeam Ops

https://github.com/bigb0sss/RedTeam-OffensiveSecurity

@BlueRedTeam