#Red_Team
RedTeam-OffensiveSecurity
Tools & Interesting Things for RedTeam Ops
https://github.com/bigb0sss/RedTeam-OffensiveSecurity
@BlueRedTeam
RedTeam-OffensiveSecurity
Tools & Interesting Things for RedTeam Ops
https://github.com/bigb0sss/RedTeam-OffensiveSecurity
@BlueRedTeam
Forwarded from Open Source intelligence [ OSINT ]
GEOINT. Number plates.
• Searching for various information and the exact location of the target is quite an exciting process. Every detail is important here, absolutely every little thing can become a clue and lead us to the goal, whether it is a road sign, traffic light, mountain relief, road markings, signposts, power lines, etc.
• Today I will share a useful resource with a huge collection of license plates from around the world. This information will help you perform a more detailed analysis and determine the target location: http://licenseplatemania.com
In addition to the main source, pay attention to the additional content:
• https://www.alpca.org
• https://www.eurolates.eu
• http://www.licensepl8s.com
• http://www.olavsplates.com
• https://www.plates-spotting.ch
• https://www.regtransfers.co.uk
• https://eurolate.org/Eurolate
• https://www.licenseplatespics.com
• http://www.worldlicenseplates.com
• https://www.matriculasdelmundo.com
• http://plaque.free.fr/index-english.html
#OSINT
@OsintBlackBox
• Searching for various information and the exact location of the target is quite an exciting process. Every detail is important here, absolutely every little thing can become a clue and lead us to the goal, whether it is a road sign, traffic light, mountain relief, road markings, signposts, power lines, etc.
• Today I will share a useful resource with a huge collection of license plates from around the world. This information will help you perform a more detailed analysis and determine the target location: http://licenseplatemania.com
In addition to the main source, pay attention to the additional content:
• https://www.alpca.org
• https://www.eurolates.eu
• http://www.licensepl8s.com
• http://www.olavsplates.com
• https://www.plates-spotting.ch
• https://www.regtransfers.co.uk
• https://eurolate.org/Eurolate
• https://www.licenseplatespics.com
• http://www.worldlicenseplates.com
• https://www.matriculasdelmundo.com
• http://plaque.free.fr/index-english.html
#OSINT
@OsintBlackBox
👍4
#Blue_Team
Iscariot Suite
The Iscariot Suite is a collection of tools to enhance and augment trusted open-source and commercial Blue Team/Sysadmin products, turning them into traitorware to achieve offensive security goals. The Iscariot Suite takes its name from the famous traitor Judas Iscariot, who - according to biblical tradition - betrayed Jesus.
https://gitlab.com/badsectorlabs/iscariot-suite
@BlueRedTeam
Iscariot Suite
The Iscariot Suite is a collection of tools to enhance and augment trusted open-source and commercial Blue Team/Sysadmin products, turning them into traitorware to achieve offensive security goals. The Iscariot Suite takes its name from the famous traitor Judas Iscariot, who - according to biblical tradition - betrayed Jesus.
https://gitlab.com/badsectorlabs/iscariot-suite
@BlueRedTeam
#Cobalt_Strike
Privat crypt Cobalt Strike and powershell
https://github.com/injectexpert/Crypt-Cobalt-Strike-Powershell
@BlueRedTeam
Privat crypt Cobalt Strike and powershell
https://github.com/injectexpert/Crypt-Cobalt-Strike-Powershell
@BlueRedTeam
👍2
#Red_Team
Large Antenna Array Space Object Tracker - Red Team
https://github.com/wjiaaaaa/LAASOT
@BlueRedTeam
Large Antenna Array Space Object Tracker - Red Team
https://github.com/wjiaaaaa/LAASOT
@BlueRedTeam
GitHub
GitHub - wjiaaaaa/LAASOT: Large Antenna Array Space Object Tracker - Red Team
Large Antenna Array Space Object Tracker - Red Team - GitHub - wjiaaaaa/LAASOT: Large Antenna Array Space Object Tracker - Red Team
#CVE-2022
SpookySSL CVE-2022-3602 SSLv3 Scanner for Windows, Linux, macOS
https://github.com/alicangnll/SpookySSL-Scanner
@BlueRedTeam
SpookySSL CVE-2022-3602 SSLv3 Scanner for Windows, Linux, macOS
https://github.com/alicangnll/SpookySSL-Scanner
@BlueRedTeam
GitHub
GitHub - alicangnll/SpookySSL-Scanner: SpookySSL CVE-2022-3602 SSLv3 Scanner for Windows, Linux, macOS
SpookySSL CVE-2022-3602 SSLv3 Scanner for Windows, Linux, macOS - alicangnll/SpookySSL-Scanner
#CVE-2022
A sample spring boot application demonstrating configuration that is vulnerable to CVE-2022-31692
https://github.com/SpindleSec/CVE-2022-31692
@BlueRedTeam
A sample spring boot application demonstrating configuration that is vulnerable to CVE-2022-31692
https://github.com/SpindleSec/CVE-2022-31692
@BlueRedTeam
GitHub
GitHub - blipzip/cve-2022-31692: A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE…
A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE-2022-31692 - blipzip/cve-2022-31692
👍3
#Red_Team
A huge chunk of my personal notes since i started playing CTFs and working as a Red Teamer.
https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks
@BlueRedTeam
A huge chunk of my personal notes since i started playing CTFs and working as a Red Teamer.
https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks
@BlueRedTeam
GitHub
GitHub - 0xsyr0/Awesome-Cybersecurity-Handbooks: A huge chunk of my personal notes since I started playing CTFs and working as…
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer. - 0xsyr0/Awesome-Cybersecurity-Handbooks
👍2
#CVE-2022
Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3
https://github.com/NCSC-NL/OpenSSL-2022
@BlueRedTeam
Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3
https://github.com/NCSC-NL/OpenSSL-2022
@BlueRedTeam
GitHub
GitHub - NCSC-NL/OpenSSL-2022: Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL…
Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3 - NCSC-NL/OpenSSL-2022
👍1
#webshell
a simple webshell build in PHP 7.4 for penetration testing and educational purposes only. ( it's not a other webshell's recode )
https://github.com/elliottophellia/ophellia
@BlueRedTeam
a simple webshell build in PHP 7.4 for penetration testing and educational purposes only. ( it's not a other webshell's recode )
https://github.com/elliottophellia/ophellia
@BlueRedTeam
GitHub
GitHub - elliottophellia/ophellia: A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing.
A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing. - elliottophellia/ophellia
👍1
#Red_Team
Red Team vs Blue Team Simulation
https://github.com/eggietama/Assessment-Analysis-and-Hardening-of-a-Vulnerable-System
@BlueRedTeam
Red Team vs Blue Team Simulation
https://github.com/eggietama/Assessment-Analysis-and-Hardening-of-a-Vulnerable-System
@BlueRedTeam
GitHub
GitHub - eggietama/Assessment-Analysis-and-Hardening-of-a-Vulnerable-System
Contribute to eggietama/Assessment-Analysis-and-Hardening-of-a-Vulnerable-System development by creating an account on GitHub.
#Red_Team
+ CredUI - With Shellcode runner
https://ired.dev/discussion/comment/4/#Comment_4
+ XOR string encryption for NET based binaries
https://github.com/dr4k0nia/XorStringsNET
+ NoRunPI: Run Your Payload Without Running Your Payload
https://github.com/ORCx41/NoRunPI
+ Various Cobalt Strike BOFs
https://github.com/rvrsh3ll/BOF_Collection
@BlueRedTeam
+ CredUI - With Shellcode runner
https://ired.dev/discussion/comment/4/#Comment_4
+ XOR string encryption for NET based binaries
https://github.com/dr4k0nia/XorStringsNET
+ NoRunPI: Run Your Payload Without Running Your Payload
https://github.com/ORCx41/NoRunPI
+ Various Cobalt Strike BOFs
https://github.com/rvrsh3ll/BOF_Collection
@BlueRedTeam
Forwarded from F.P.W Library Sec [ CyberSecurity Book ]
#CVE-2022
DrayTek unauthenticated remote code execution vulnerability (CVE-2022-32548) in /cgi-bin/wlogin.cgi via username field
https://github.com/HarleyDoo/CVE-2022-32548-RCE-POC
@BlueRedTeam
DrayTek unauthenticated remote code execution vulnerability (CVE-2022-32548) in /cgi-bin/wlogin.cgi via username field
https://github.com/HarleyDoo/CVE-2022-32548-RCE-POC
@BlueRedTeam
👍1
#Red_Team
A Azure Exploitation Toolkit for Red Team & Pentesters
https://github.com/SikretaLabs/BlueMap
@BlueRedTeam
A Azure Exploitation Toolkit for Red Team & Pentesters
https://github.com/SikretaLabs/BlueMap
@BlueRedTeam
GitHub
GitHub - SikretaLabs/BlueMap: A Azure Exploitation Toolkit for Red Team & Pentesters
A Azure Exploitation Toolkit for Red Team & Pentesters - SikretaLabs/BlueMap
👍1
#CVE-2022
The first poc video presenting the sql injection test from ( WordPress Core 5.8.2-'WP_Query' / CVE-2022-21661)
https://github.com/APTIRAN/CVE-2022-21661
@BlueRedTeam
The first poc video presenting the sql injection test from ( WordPress Core 5.8.2-'WP_Query' / CVE-2022-21661)
https://github.com/APTIRAN/CVE-2022-21661
@BlueRedTeam
🔥1