Red Blue Team – Telegram
Red Blue Team
5.02K subscribers
38 photos
5 videos
33 files
1.43K links
-> 20 June 2019

]-> RedTeam | BlueTeam | Pentest

[-> Blue Team @BlueTeamKit
Download Telegram
Red Blue Team pinned Deleted message
#Red_Team
Environment configuration for Red Team Cyber Security testings and tasks

https://github.com/zackjmccann/red-team-security

@BlueRedTeam
#Red_Team

RedEye is an open-source analytic tool developed by CISA and DOE’s Pacific Northwest National Laboratory to assist Red Teams with visualizing and reporting command and control activities. This tool, released in October 2022 on GitHub, allows an operator to assess and display complex data, evaluate mitigation strategies, and enable effective decision making in response to a Red Team assessment.

The tool parses logs, such as those from Cobalt Strike, and presents the data in an easily digestible format. The users can then tag and add comments to activities displayed within the tool. The operators can use the RedEye’s presentation mode to present findings and workflow to stakeholders.

https://github.com/cisagov/RedEye

@BlueRedTeam
#Red_Team

Template-Driven AV/EDR Evasion Framework.

Modern Penetration Testing and Red Teaming often require bypassing common AV/EDR appliances in order to execute code on a target. With time, defenses are becoming more complex and inherently more difficult to bypass consistently.

Inceptor is a tool that can help to automate a great part of this process, hopefully requiring no further effort.

Inceptor is a template-based PE packer for Windows, designed to help penetration testers and red teamers to bypass common AV and EDR solutions. Inceptor has been designed with a focus on usability, and to allow extensive user customization.

https://github.com/klezVirus/inceptor

@BlueRedTeam
👍3
#Purple_Team

Codecepticon is a .NET application that allows you to obfuscate C#, VBA/VB6 (macros), and PowerShell source code, and is developed for offensive security engagements such as Red/Purple Teams.

What separates Codecepticon from other obfuscators is that it targets the source code rather than the compiled executables, and was developed specifically for AV/EDR evasion

https://github.com/Accenture/Codecepticon

@BlueRedTeam
#CVE-2022

TOP All bugbounty pentesting CVE-2022- POC Exp  RCE example payload  Things

https://github.com/privatenets/Discord-Image-Token-Password-Grabber-Exploit-Cve-2022

@BlueRedTeam
#Red_Team
​​RedTeam-OffensiveSecurity

Tools & Interesting Things for RedTeam Ops

https://github.com/bigb0sss/RedTeam-OffensiveSecurity

@BlueRedTeam
Forwarded from Open Source intelligence [ OSINT ]
GEOINT. Number plates.


• Searching for various information and the exact location of the target is quite an exciting process. Every detail is important here, absolutely every little thing can become a clue and lead us to the goal, whether it is a road sign, traffic light, mountain relief, road markings, signposts, power lines, etc.

• Today I will share a useful resource with a huge collection of license plates from around the world. This information will help you perform a more detailed analysis and determine the target location: http://licenseplatemania.com

In addition to the main source, pay attention to the additional content:

https://www.alpca.org
https://www.eurolates.eu
http://www.licensepl8s.com
http://www.olavsplates.com
https://www.plates-spotting.ch
https://www.regtransfers.co.uk
https://eurolate.org/Eurolate
https://www.licenseplatespics.com
http://www.worldlicenseplates.com
https://www.matriculasdelmundo.com
http://plaque.free.fr/index-english.html

#OSINT
@OsintBlackBox
👍4
#Blue_Team
​​Iscariot Suite

The Iscariot Suite is a collection of tools to enhance and augment trusted open-source and commercial Blue Team/Sysadmin products, turning them into traitorware to achieve offensive security goals. The Iscariot Suite takes its name from the famous traitor Judas Iscariot, who - according to biblical tradition - betrayed Jesus.

https://gitlab.com/badsectorlabs/iscariot-suite

@BlueRedTeam