#Red_Team
Template-Driven AV/EDR Evasion Framework.
Modern Penetration Testing and Red Teaming often require bypassing common AV/EDR appliances in order to execute code on a target. With time, defenses are becoming more complex and inherently more difficult to bypass consistently.
Inceptor is a tool that can help to automate a great part of this process, hopefully requiring no further effort.
Inceptor is a template-based PE packer for Windows, designed to help penetration testers and red teamers to bypass common AV and EDR solutions. Inceptor has been designed with a focus on usability, and to allow extensive user customization.
https://github.com/klezVirus/inceptor
@BlueRedTeam
Template-Driven AV/EDR Evasion Framework.
Modern Penetration Testing and Red Teaming often require bypassing common AV/EDR appliances in order to execute code on a target. With time, defenses are becoming more complex and inherently more difficult to bypass consistently.
Inceptor is a tool that can help to automate a great part of this process, hopefully requiring no further effort.
Inceptor is a template-based PE packer for Windows, designed to help penetration testers and red teamers to bypass common AV and EDR solutions. Inceptor has been designed with a focus on usability, and to allow extensive user customization.
https://github.com/klezVirus/inceptor
@BlueRedTeam
GitHub
GitHub - klezVirus/inceptor: Template-Driven AV/EDR Evasion Framework
Template-Driven AV/EDR Evasion Framework. Contribute to klezVirus/inceptor development by creating an account on GitHub.
👍3
#Red_Team
Awesome Command & Control
A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments.
https://github.com/tcostam/awesome-command-control
@BlueRedTeam
Awesome Command & Control
A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments.
https://github.com/tcostam/awesome-command-control
@BlueRedTeam
GitHub
GitHub - tcostam/awesome-command-control: A collection of awesome Command & Control (C2) frameworks, tools and resources for post…
A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments. - tcostam/awesome-command-control
👍2
#Purple_Team
Codecepticon is a .NET application that allows you to obfuscate C#, VBA/VB6 (macros), and PowerShell source code, and is developed for offensive security engagements such as Red/Purple Teams.
What separates Codecepticon from other obfuscators is that it targets the source code rather than the compiled executables, and was developed specifically for AV/EDR evasion
https://github.com/Accenture/Codecepticon
@BlueRedTeam
Codecepticon is a .NET application that allows you to obfuscate C#, VBA/VB6 (macros), and PowerShell source code, and is developed for offensive security engagements such as Red/Purple Teams.
What separates Codecepticon from other obfuscators is that it targets the source code rather than the compiled executables, and was developed specifically for AV/EDR evasion
https://github.com/Accenture/Codecepticon
@BlueRedTeam
GitHub
GitHub - Accenture/Codecepticon: .NET/PowerShell/VBA Offensive Security Obfuscator
.NET/PowerShell/VBA Offensive Security Obfuscator. Contribute to Accenture/Codecepticon development by creating an account on GitHub.
#Purple_Team
EDR-Test
Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike .
https://github.com/TH3xACE/EDR-Test
@BlueRedTeam
EDR-Test
Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike .
https://github.com/TH3xACE/EDR-Test
@BlueRedTeam
GitHub
GitHub - TH3xACE/EDR-Test: Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].
Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team]. - GitHub - TH3xACE/EDR-Test: Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple ...
#Red_Team
Collection of PoC and offensive techniques used by the BlackArrow Red Team
https://github.com/blackarrowsec/redteam-research
@BlueRedTeam
Collection of PoC and offensive techniques used by the BlackArrow Red Team
https://github.com/blackarrowsec/redteam-research
@BlueRedTeam
GitHub
GitHub - blackarrowsec/redteam-research: Collection of PoC and offensive techniques used by the BlackArrow Red Team
Collection of PoC and offensive techniques used by the BlackArrow Red Team - blackarrowsec/redteam-research
#webshell
a simple webshell build in PHP 7.4 for penetration testing and educational purposes only.
https://github.com/Elliottophellia/ophellia
@BlueRedTeam
a simple webshell build in PHP 7.4 for penetration testing and educational purposes only.
https://github.com/Elliottophellia/ophellia
@BlueRedTeam
GitHub
GitHub - elliottophellia/ophellia: A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing.
A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing. - elliottophellia/ophellia
🔥6
#CVE-2022
TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
https://github.com/privatenets/Discord-Image-Token-Password-Grabber-Exploit-Cve-2022
@BlueRedTeam
TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
https://github.com/privatenets/Discord-Image-Token-Password-Grabber-Exploit-Cve-2022
@BlueRedTeam
#Red_Team
RedTeam-OffensiveSecurity
Tools & Interesting Things for RedTeam Ops
https://github.com/bigb0sss/RedTeam-OffensiveSecurity
@BlueRedTeam
RedTeam-OffensiveSecurity
Tools & Interesting Things for RedTeam Ops
https://github.com/bigb0sss/RedTeam-OffensiveSecurity
@BlueRedTeam
Forwarded from Open Source intelligence [ OSINT ]
GEOINT. Number plates.
• Searching for various information and the exact location of the target is quite an exciting process. Every detail is important here, absolutely every little thing can become a clue and lead us to the goal, whether it is a road sign, traffic light, mountain relief, road markings, signposts, power lines, etc.
• Today I will share a useful resource with a huge collection of license plates from around the world. This information will help you perform a more detailed analysis and determine the target location: http://licenseplatemania.com
In addition to the main source, pay attention to the additional content:
• https://www.alpca.org
• https://www.eurolates.eu
• http://www.licensepl8s.com
• http://www.olavsplates.com
• https://www.plates-spotting.ch
• https://www.regtransfers.co.uk
• https://eurolate.org/Eurolate
• https://www.licenseplatespics.com
• http://www.worldlicenseplates.com
• https://www.matriculasdelmundo.com
• http://plaque.free.fr/index-english.html
#OSINT
@OsintBlackBox
• Searching for various information and the exact location of the target is quite an exciting process. Every detail is important here, absolutely every little thing can become a clue and lead us to the goal, whether it is a road sign, traffic light, mountain relief, road markings, signposts, power lines, etc.
• Today I will share a useful resource with a huge collection of license plates from around the world. This information will help you perform a more detailed analysis and determine the target location: http://licenseplatemania.com
In addition to the main source, pay attention to the additional content:
• https://www.alpca.org
• https://www.eurolates.eu
• http://www.licensepl8s.com
• http://www.olavsplates.com
• https://www.plates-spotting.ch
• https://www.regtransfers.co.uk
• https://eurolate.org/Eurolate
• https://www.licenseplatespics.com
• http://www.worldlicenseplates.com
• https://www.matriculasdelmundo.com
• http://plaque.free.fr/index-english.html
#OSINT
@OsintBlackBox
👍4
#Blue_Team
Iscariot Suite
The Iscariot Suite is a collection of tools to enhance and augment trusted open-source and commercial Blue Team/Sysadmin products, turning them into traitorware to achieve offensive security goals. The Iscariot Suite takes its name from the famous traitor Judas Iscariot, who - according to biblical tradition - betrayed Jesus.
https://gitlab.com/badsectorlabs/iscariot-suite
@BlueRedTeam
Iscariot Suite
The Iscariot Suite is a collection of tools to enhance and augment trusted open-source and commercial Blue Team/Sysadmin products, turning them into traitorware to achieve offensive security goals. The Iscariot Suite takes its name from the famous traitor Judas Iscariot, who - according to biblical tradition - betrayed Jesus.
https://gitlab.com/badsectorlabs/iscariot-suite
@BlueRedTeam
#Cobalt_Strike
Privat crypt Cobalt Strike and powershell
https://github.com/injectexpert/Crypt-Cobalt-Strike-Powershell
@BlueRedTeam
Privat crypt Cobalt Strike and powershell
https://github.com/injectexpert/Crypt-Cobalt-Strike-Powershell
@BlueRedTeam
👍2
#Red_Team
Large Antenna Array Space Object Tracker - Red Team
https://github.com/wjiaaaaa/LAASOT
@BlueRedTeam
Large Antenna Array Space Object Tracker - Red Team
https://github.com/wjiaaaaa/LAASOT
@BlueRedTeam
GitHub
GitHub - wjiaaaaa/LAASOT: Large Antenna Array Space Object Tracker - Red Team
Large Antenna Array Space Object Tracker - Red Team - GitHub - wjiaaaaa/LAASOT: Large Antenna Array Space Object Tracker - Red Team
#CVE-2022
SpookySSL CVE-2022-3602 SSLv3 Scanner for Windows, Linux, macOS
https://github.com/alicangnll/SpookySSL-Scanner
@BlueRedTeam
SpookySSL CVE-2022-3602 SSLv3 Scanner for Windows, Linux, macOS
https://github.com/alicangnll/SpookySSL-Scanner
@BlueRedTeam
GitHub
GitHub - alicangnll/SpookySSL-Scanner: SpookySSL CVE-2022-3602 SSLv3 Scanner for Windows, Linux, macOS
SpookySSL CVE-2022-3602 SSLv3 Scanner for Windows, Linux, macOS - alicangnll/SpookySSL-Scanner
#CVE-2022
A sample spring boot application demonstrating configuration that is vulnerable to CVE-2022-31692
https://github.com/SpindleSec/CVE-2022-31692
@BlueRedTeam
A sample spring boot application demonstrating configuration that is vulnerable to CVE-2022-31692
https://github.com/SpindleSec/CVE-2022-31692
@BlueRedTeam
GitHub
GitHub - blipzip/cve-2022-31692: A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE…
A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE-2022-31692 - blipzip/cve-2022-31692
👍3
#Red_Team
A huge chunk of my personal notes since i started playing CTFs and working as a Red Teamer.
https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks
@BlueRedTeam
A huge chunk of my personal notes since i started playing CTFs and working as a Red Teamer.
https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks
@BlueRedTeam
GitHub
GitHub - 0xsyr0/Awesome-Cybersecurity-Handbooks: A huge chunk of my personal notes since I started playing CTFs and working as…
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer. - 0xsyr0/Awesome-Cybersecurity-Handbooks
👍2
#CVE-2022
Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3
https://github.com/NCSC-NL/OpenSSL-2022
@BlueRedTeam
Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3
https://github.com/NCSC-NL/OpenSSL-2022
@BlueRedTeam
GitHub
GitHub - NCSC-NL/OpenSSL-2022: Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL…
Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3 - NCSC-NL/OpenSSL-2022
👍1
#webshell
a simple webshell build in PHP 7.4 for penetration testing and educational purposes only. ( it's not a other webshell's recode )
https://github.com/elliottophellia/ophellia
@BlueRedTeam
a simple webshell build in PHP 7.4 for penetration testing and educational purposes only. ( it's not a other webshell's recode )
https://github.com/elliottophellia/ophellia
@BlueRedTeam
GitHub
GitHub - elliottophellia/ophellia: A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing.
A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing. - elliottophellia/ophellia
👍1