#CVE-2022
A sample spring boot application demonstrating configuration that is vulnerable to CVE-2022-31692
https://github.com/SpindleSec/CVE-2022-31692
@BlueRedTeam
A sample spring boot application demonstrating configuration that is vulnerable to CVE-2022-31692
https://github.com/SpindleSec/CVE-2022-31692
@BlueRedTeam
GitHub
GitHub - blipzip/cve-2022-31692: A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE…
A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE-2022-31692 - blipzip/cve-2022-31692
👍3
#Red_Team
A huge chunk of my personal notes since i started playing CTFs and working as a Red Teamer.
https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks
@BlueRedTeam
A huge chunk of my personal notes since i started playing CTFs and working as a Red Teamer.
https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks
@BlueRedTeam
GitHub
GitHub - 0xsyr0/Awesome-Cybersecurity-Handbooks: A huge chunk of my personal notes since I started playing CTFs and working as…
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer. - 0xsyr0/Awesome-Cybersecurity-Handbooks
👍2
#CVE-2022
Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3
https://github.com/NCSC-NL/OpenSSL-2022
@BlueRedTeam
Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3
https://github.com/NCSC-NL/OpenSSL-2022
@BlueRedTeam
GitHub
GitHub - NCSC-NL/OpenSSL-2022: Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL…
Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3 - NCSC-NL/OpenSSL-2022
👍1
#webshell
a simple webshell build in PHP 7.4 for penetration testing and educational purposes only. ( it's not a other webshell's recode )
https://github.com/elliottophellia/ophellia
@BlueRedTeam
a simple webshell build in PHP 7.4 for penetration testing and educational purposes only. ( it's not a other webshell's recode )
https://github.com/elliottophellia/ophellia
@BlueRedTeam
GitHub
GitHub - elliottophellia/ophellia: A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing.
A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing. - elliottophellia/ophellia
👍1
#Red_Team
Red Team vs Blue Team Simulation
https://github.com/eggietama/Assessment-Analysis-and-Hardening-of-a-Vulnerable-System
@BlueRedTeam
Red Team vs Blue Team Simulation
https://github.com/eggietama/Assessment-Analysis-and-Hardening-of-a-Vulnerable-System
@BlueRedTeam
GitHub
GitHub - eggietama/Assessment-Analysis-and-Hardening-of-a-Vulnerable-System
Contribute to eggietama/Assessment-Analysis-and-Hardening-of-a-Vulnerable-System development by creating an account on GitHub.
#Red_Team
+ CredUI - With Shellcode runner
https://ired.dev/discussion/comment/4/#Comment_4
+ XOR string encryption for NET based binaries
https://github.com/dr4k0nia/XorStringsNET
+ NoRunPI: Run Your Payload Without Running Your Payload
https://github.com/ORCx41/NoRunPI
+ Various Cobalt Strike BOFs
https://github.com/rvrsh3ll/BOF_Collection
@BlueRedTeam
+ CredUI - With Shellcode runner
https://ired.dev/discussion/comment/4/#Comment_4
+ XOR string encryption for NET based binaries
https://github.com/dr4k0nia/XorStringsNET
+ NoRunPI: Run Your Payload Without Running Your Payload
https://github.com/ORCx41/NoRunPI
+ Various Cobalt Strike BOFs
https://github.com/rvrsh3ll/BOF_Collection
@BlueRedTeam
Forwarded from F.P.W Library Sec [ CyberSecurity Book ]
#CVE-2022
DrayTek unauthenticated remote code execution vulnerability (CVE-2022-32548) in /cgi-bin/wlogin.cgi via username field
https://github.com/HarleyDoo/CVE-2022-32548-RCE-POC
@BlueRedTeam
DrayTek unauthenticated remote code execution vulnerability (CVE-2022-32548) in /cgi-bin/wlogin.cgi via username field
https://github.com/HarleyDoo/CVE-2022-32548-RCE-POC
@BlueRedTeam
👍1
#Red_Team
A Azure Exploitation Toolkit for Red Team & Pentesters
https://github.com/SikretaLabs/BlueMap
@BlueRedTeam
A Azure Exploitation Toolkit for Red Team & Pentesters
https://github.com/SikretaLabs/BlueMap
@BlueRedTeam
GitHub
GitHub - SikretaLabs/BlueMap: A Azure Exploitation Toolkit for Red Team & Pentesters
A Azure Exploitation Toolkit for Red Team & Pentesters - SikretaLabs/BlueMap
👍1
#CVE-2022
The first poc video presenting the sql injection test from ( WordPress Core 5.8.2-'WP_Query' / CVE-2022-21661)
https://github.com/APTIRAN/CVE-2022-21661
@BlueRedTeam
The first poc video presenting the sql injection test from ( WordPress Core 5.8.2-'WP_Query' / CVE-2022-21661)
https://github.com/APTIRAN/CVE-2022-21661
@BlueRedTeam
🔥1
#Blue_Team
Detecting ADCS web services abuse
https://medium.com/falconforce/falconfriday-detecting-adcs-web-services-abuse-0xff20-9f660c83cb36
@BlueRedTeam
Detecting ADCS web services abuse
https://medium.com/falconforce/falconfriday-detecting-adcs-web-services-abuse-0xff20-9f660c83cb36
@BlueRedTeam
Medium
FalconFriday — Detecting ADCS web services abuse — 0xFF20
One of the popular attack vectors against ADCS is ESC8 — relaying NTLM creds to the ADCS HTTP(S) endpoints. While preventing this…
#CVE-2022
A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE-2022-31692
https://github.com/SpindleSec/cve-2022-31692
@BlueRedTeam
A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE-2022-31692
https://github.com/SpindleSec/cve-2022-31692
@BlueRedTeam
GitHub
GitHub - blipzip/cve-2022-31692: A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE…
A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE-2022-31692 - blipzip/cve-2022-31692
#CVE-2022
Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)
https://github.com/cryxnet/CVE-2022-42889-RCE
@BlueRedTeam
Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)
https://github.com/cryxnet/CVE-2022-42889-RCE
@BlueRedTeam
GitHub
GitHub - cryxnet/CVE-2022-42889-RCE: Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)
Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability) - GitHub - cryxnet/CVE-2022-42889-RCE: Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)
#CVE-2022
CVE-2022-0824, CVE-2022-0829, File Manger privilege exploit
https://github.com/gokul-ramesh/WebminRCE-exploit
@BlueRedTeam
CVE-2022-0824, CVE-2022-0829, File Manger privilege exploit
https://github.com/gokul-ramesh/WebminRCE-exploit
@BlueRedTeam
GitHub
GitHub - gokul-ramesh/WebminRCE-exploit: CVE-2022-0824, CVE-2022-0829, File Manger privilege exploit
CVE-2022-0824, CVE-2022-0829, File Manger privilege exploit - gokul-ramesh/WebminRCE-exploit
#CVE-2022
Detects attempts at exploitation of CVE-2022-3602, a remote code execution vulnerability in OpenSSL v 3.0.0 through v.3.0.6
https://github.com/corelight/CVE-2022-3602
@BlueRedTeam
Detects attempts at exploitation of CVE-2022-3602, a remote code execution vulnerability in OpenSSL v 3.0.0 through v.3.0.6
https://github.com/corelight/CVE-2022-3602
@BlueRedTeam
GitHub
GitHub - corelight/CVE-2022-3602: Detects attempts at exploitation of CVE-2022-3602, a remote code execution vulnerability in OpenSSL…
Detects attempts at exploitation of CVE-2022-3602, a remote code execution vulnerability in OpenSSL v 3.0.0 through v.3.0.6 - GitHub - corelight/CVE-2022-3602: Detects attempts at exploitation of ...
#Red_Team
For Portable PE to download in Red Team Operation
https://github.com/cymonl33t1333/PE
@BlueRedTeam
For Portable PE to download in Red Team Operation
https://github.com/cymonl33t1333/PE
@BlueRedTeam