#CVE-2022
Utilities for exploiting vulnerability CVE-2022-40684 (FortiOS / FortiProxy / FortiSwitchManager - Authentication bypass on administrative interface).
https://github.com/und3sc0n0c1d0/CVE-2022-40684
@BlueRedTeam
Utilities for exploiting vulnerability CVE-2022-40684 (FortiOS / FortiProxy / FortiSwitchManager - Authentication bypass on administrative interface).
https://github.com/und3sc0n0c1d0/CVE-2022-40684
@BlueRedTeam
GitHub
GitHub - und3sc0n0c1d0/CVE-2022-40684: Utilities for exploiting vulnerability CVE-2022-40684 (FortiOS / FortiProxy / FortiSwitchManager…
Utilities for exploiting vulnerability CVE-2022-40684 (FortiOS / FortiProxy / FortiSwitchManager - Authentication bypass on administrative interface). - und3sc0n0c1d0/CVE-2022-40684
👍3
#CVE-2022
You can find a python noscript to exploit the vulnerability on Bitbucket related CVE-2022-36804.
https://github.com/khal4n1/CVE-2022-36804
@BlueRedTeam
You can find a python noscript to exploit the vulnerability on Bitbucket related CVE-2022-36804.
https://github.com/khal4n1/CVE-2022-36804
@BlueRedTeam
GitHub
GitHub - khal4n1/CVE-2022-36804: You can find a python noscript to exploit the vulnerability on Bitbucket related CVE-2022-36804.
You can find a python noscript to exploit the vulnerability on Bitbucket related CVE-2022-36804. - khal4n1/CVE-2022-36804
#Blue_Team
How to Investigate Insider Threats (Forensic Methodology)
https://www.inversecos.com/2022/10/how-to-investigate-insider-threats.html
@BlueRedTeam
How to Investigate Insider Threats (Forensic Methodology)
https://www.inversecos.com/2022/10/how-to-investigate-insider-threats.html
@BlueRedTeam
Inversecos
How to Investigate Insider Threats (Forensic Methodology)
👍4
#Red_Team
+ Redeye - Pentest operation tool
https://github.com/redeye-framework/Redeye
+ Bayanay - Python Wardriving
https://github.com/anil-yelken/wardriving
@BlueRedTeam
+ Redeye - Pentest operation tool
https://github.com/redeye-framework/Redeye
+ Bayanay - Python Wardriving
https://github.com/anil-yelken/wardriving
@BlueRedTeam
GitHub
GitHub - redeye-framework/Redeye: Redeye is a tool intended to help you manage your data during a pentest operation
Redeye is a tool intended to help you manage your data during a pentest operation - redeye-framework/Redeye
#Red_Team
RedEye is an open-source analytic tool developed by CISA and DOE’s Pacific Northwest National Laboratory to assist Red Teams with visualizing and reporting command and control activities. This tool, released in October 2022 on GitHub, allows an operator to assess and display complex data, evaluate mitigation strategies, and enable effective decision making in response to a Red Team assessment.
The tool parses logs, such as those from Cobalt Strike, and presents the data in an easily digestible format. The users can then tag and add comments to activities displayed within the tool. The operators can use the RedEye’s presentation mode to present findings and workflow to stakeholders.
https://github.com/cisagov/RedEye
@BlueRedTeam
RedEye is an open-source analytic tool developed by CISA and DOE’s Pacific Northwest National Laboratory to assist Red Teams with visualizing and reporting command and control activities. This tool, released in October 2022 on GitHub, allows an operator to assess and display complex data, evaluate mitigation strategies, and enable effective decision making in response to a Red Team assessment.
The tool parses logs, such as those from Cobalt Strike, and presents the data in an easily digestible format. The users can then tag and add comments to activities displayed within the tool. The operators can use the RedEye’s presentation mode to present findings and workflow to stakeholders.
https://github.com/cisagov/RedEye
@BlueRedTeam
GitHub
GitHub - cisagov/RedEye: RedEye is a visual analytic tool supporting Red & Blue Team operations
RedEye is a visual analytic tool supporting Red & Blue Team operations - cisagov/RedEye
#Red_Team
Template-Driven AV/EDR Evasion Framework.
Modern Penetration Testing and Red Teaming often require bypassing common AV/EDR appliances in order to execute code on a target. With time, defenses are becoming more complex and inherently more difficult to bypass consistently.
Inceptor is a tool that can help to automate a great part of this process, hopefully requiring no further effort.
Inceptor is a template-based PE packer for Windows, designed to help penetration testers and red teamers to bypass common AV and EDR solutions. Inceptor has been designed with a focus on usability, and to allow extensive user customization.
https://github.com/klezVirus/inceptor
@BlueRedTeam
Template-Driven AV/EDR Evasion Framework.
Modern Penetration Testing and Red Teaming often require bypassing common AV/EDR appliances in order to execute code on a target. With time, defenses are becoming more complex and inherently more difficult to bypass consistently.
Inceptor is a tool that can help to automate a great part of this process, hopefully requiring no further effort.
Inceptor is a template-based PE packer for Windows, designed to help penetration testers and red teamers to bypass common AV and EDR solutions. Inceptor has been designed with a focus on usability, and to allow extensive user customization.
https://github.com/klezVirus/inceptor
@BlueRedTeam
GitHub
GitHub - klezVirus/inceptor: Template-Driven AV/EDR Evasion Framework
Template-Driven AV/EDR Evasion Framework. Contribute to klezVirus/inceptor development by creating an account on GitHub.
👍3
#Red_Team
Awesome Command & Control
A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments.
https://github.com/tcostam/awesome-command-control
@BlueRedTeam
Awesome Command & Control
A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments.
https://github.com/tcostam/awesome-command-control
@BlueRedTeam
GitHub
GitHub - tcostam/awesome-command-control: A collection of awesome Command & Control (C2) frameworks, tools and resources for post…
A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments. - tcostam/awesome-command-control
👍2
#Purple_Team
Codecepticon is a .NET application that allows you to obfuscate C#, VBA/VB6 (macros), and PowerShell source code, and is developed for offensive security engagements such as Red/Purple Teams.
What separates Codecepticon from other obfuscators is that it targets the source code rather than the compiled executables, and was developed specifically for AV/EDR evasion
https://github.com/Accenture/Codecepticon
@BlueRedTeam
Codecepticon is a .NET application that allows you to obfuscate C#, VBA/VB6 (macros), and PowerShell source code, and is developed for offensive security engagements such as Red/Purple Teams.
What separates Codecepticon from other obfuscators is that it targets the source code rather than the compiled executables, and was developed specifically for AV/EDR evasion
https://github.com/Accenture/Codecepticon
@BlueRedTeam
GitHub
GitHub - Accenture/Codecepticon: .NET/PowerShell/VBA Offensive Security Obfuscator
.NET/PowerShell/VBA Offensive Security Obfuscator. Contribute to Accenture/Codecepticon development by creating an account on GitHub.
#Purple_Team
EDR-Test
Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike .
https://github.com/TH3xACE/EDR-Test
@BlueRedTeam
EDR-Test
Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike .
https://github.com/TH3xACE/EDR-Test
@BlueRedTeam
GitHub
GitHub - TH3xACE/EDR-Test: Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].
Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team]. - GitHub - TH3xACE/EDR-Test: Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple ...
#Red_Team
Collection of PoC and offensive techniques used by the BlackArrow Red Team
https://github.com/blackarrowsec/redteam-research
@BlueRedTeam
Collection of PoC and offensive techniques used by the BlackArrow Red Team
https://github.com/blackarrowsec/redteam-research
@BlueRedTeam
GitHub
GitHub - blackarrowsec/redteam-research: Collection of PoC and offensive techniques used by the BlackArrow Red Team
Collection of PoC and offensive techniques used by the BlackArrow Red Team - blackarrowsec/redteam-research
#webshell
a simple webshell build in PHP 7.4 for penetration testing and educational purposes only.
https://github.com/Elliottophellia/ophellia
@BlueRedTeam
a simple webshell build in PHP 7.4 for penetration testing and educational purposes only.
https://github.com/Elliottophellia/ophellia
@BlueRedTeam
GitHub
GitHub - elliottophellia/ophellia: A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing.
A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing. - elliottophellia/ophellia
🔥6
#CVE-2022
TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
https://github.com/privatenets/Discord-Image-Token-Password-Grabber-Exploit-Cve-2022
@BlueRedTeam
TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
https://github.com/privatenets/Discord-Image-Token-Password-Grabber-Exploit-Cve-2022
@BlueRedTeam
#Red_Team
RedTeam-OffensiveSecurity
Tools & Interesting Things for RedTeam Ops
https://github.com/bigb0sss/RedTeam-OffensiveSecurity
@BlueRedTeam
RedTeam-OffensiveSecurity
Tools & Interesting Things for RedTeam Ops
https://github.com/bigb0sss/RedTeam-OffensiveSecurity
@BlueRedTeam
Forwarded from Open Source intelligence [ OSINT ]
GEOINT. Number plates.
• Searching for various information and the exact location of the target is quite an exciting process. Every detail is important here, absolutely every little thing can become a clue and lead us to the goal, whether it is a road sign, traffic light, mountain relief, road markings, signposts, power lines, etc.
• Today I will share a useful resource with a huge collection of license plates from around the world. This information will help you perform a more detailed analysis and determine the target location: http://licenseplatemania.com
In addition to the main source, pay attention to the additional content:
• https://www.alpca.org
• https://www.eurolates.eu
• http://www.licensepl8s.com
• http://www.olavsplates.com
• https://www.plates-spotting.ch
• https://www.regtransfers.co.uk
• https://eurolate.org/Eurolate
• https://www.licenseplatespics.com
• http://www.worldlicenseplates.com
• https://www.matriculasdelmundo.com
• http://plaque.free.fr/index-english.html
#OSINT
@OsintBlackBox
• Searching for various information and the exact location of the target is quite an exciting process. Every detail is important here, absolutely every little thing can become a clue and lead us to the goal, whether it is a road sign, traffic light, mountain relief, road markings, signposts, power lines, etc.
• Today I will share a useful resource with a huge collection of license plates from around the world. This information will help you perform a more detailed analysis and determine the target location: http://licenseplatemania.com
In addition to the main source, pay attention to the additional content:
• https://www.alpca.org
• https://www.eurolates.eu
• http://www.licensepl8s.com
• http://www.olavsplates.com
• https://www.plates-spotting.ch
• https://www.regtransfers.co.uk
• https://eurolate.org/Eurolate
• https://www.licenseplatespics.com
• http://www.worldlicenseplates.com
• https://www.matriculasdelmundo.com
• http://plaque.free.fr/index-english.html
#OSINT
@OsintBlackBox
👍4
#Blue_Team
Iscariot Suite
The Iscariot Suite is a collection of tools to enhance and augment trusted open-source and commercial Blue Team/Sysadmin products, turning them into traitorware to achieve offensive security goals. The Iscariot Suite takes its name from the famous traitor Judas Iscariot, who - according to biblical tradition - betrayed Jesus.
https://gitlab.com/badsectorlabs/iscariot-suite
@BlueRedTeam
Iscariot Suite
The Iscariot Suite is a collection of tools to enhance and augment trusted open-source and commercial Blue Team/Sysadmin products, turning them into traitorware to achieve offensive security goals. The Iscariot Suite takes its name from the famous traitor Judas Iscariot, who - according to biblical tradition - betrayed Jesus.
https://gitlab.com/badsectorlabs/iscariot-suite
@BlueRedTeam
#Cobalt_Strike
Privat crypt Cobalt Strike and powershell
https://github.com/injectexpert/Crypt-Cobalt-Strike-Powershell
@BlueRedTeam
Privat crypt Cobalt Strike and powershell
https://github.com/injectexpert/Crypt-Cobalt-Strike-Powershell
@BlueRedTeam
👍2
#Red_Team
Large Antenna Array Space Object Tracker - Red Team
https://github.com/wjiaaaaa/LAASOT
@BlueRedTeam
Large Antenna Array Space Object Tracker - Red Team
https://github.com/wjiaaaaa/LAASOT
@BlueRedTeam
GitHub
GitHub - wjiaaaaa/LAASOT: Large Antenna Array Space Object Tracker - Red Team
Large Antenna Array Space Object Tracker - Red Team - GitHub - wjiaaaaa/LAASOT: Large Antenna Array Space Object Tracker - Red Team
#CVE-2022
SpookySSL CVE-2022-3602 SSLv3 Scanner for Windows, Linux, macOS
https://github.com/alicangnll/SpookySSL-Scanner
@BlueRedTeam
SpookySSL CVE-2022-3602 SSLv3 Scanner for Windows, Linux, macOS
https://github.com/alicangnll/SpookySSL-Scanner
@BlueRedTeam
GitHub
GitHub - alicangnll/SpookySSL-Scanner: SpookySSL CVE-2022-3602 SSLv3 Scanner for Windows, Linux, macOS
SpookySSL CVE-2022-3602 SSLv3 Scanner for Windows, Linux, macOS - alicangnll/SpookySSL-Scanner