#CVE-2022
Detects attempts at exploitation of CVE-2022-3602, a remote code execution vulnerability in OpenSSL v 3.0.0 through v.3.0.6
https://github.com/corelight/CVE-2022-3602
@BlueRedTeam
Detects attempts at exploitation of CVE-2022-3602, a remote code execution vulnerability in OpenSSL v 3.0.0 through v.3.0.6
https://github.com/corelight/CVE-2022-3602
@BlueRedTeam
GitHub
GitHub - corelight/CVE-2022-3602: Detects attempts at exploitation of CVE-2022-3602, a remote code execution vulnerability in OpenSSL…
Detects attempts at exploitation of CVE-2022-3602, a remote code execution vulnerability in OpenSSL v 3.0.0 through v.3.0.6 - GitHub - corelight/CVE-2022-3602: Detects attempts at exploitation of ...
#Red_Team
For Portable PE to download in Red Team Operation
https://github.com/cymonl33t1333/PE
@BlueRedTeam
For Portable PE to download in Red Team Operation
https://github.com/cymonl33t1333/PE
@BlueRedTeam
👍1
#webshell
super tiny remote webshell with some helpers. Not trying to hide anything, just a simple shell
https://github.com/lojikil/tinyshell
@BlueRedTeam
super tiny remote webshell with some helpers. Not trying to hide anything, just a simple shell
https://github.com/lojikil/tinyshell
@BlueRedTeam
GitHub
GitHub - lojikil/tinyshell: super tiny remote webshell with some helpers. Not trying to hide anything, just a simple shell
super tiny remote webshell with some helpers. Not trying to hide anything, just a simple shell - GitHub - lojikil/tinyshell: super tiny remote webshell with some helpers. Not trying to hide anythin...
#Red_Team
A Azure Exploitation Toolkit for Red Team & Pentesters
https://github.com/tota1099/django-soccer
@BlueRedTeam
A Azure Exploitation Toolkit for Red Team & Pentesters
https://github.com/tota1099/django-soccer
@BlueRedTeam
GitHub
GitHub - tota1099/django-soccer: The idea was to learn about the Django framework, building a simple application focused on managing…
The idea was to learn about the Django framework, building a simple application focused on managing a football team. With the application, one can add players, positions, games, scores, yellow and...
👍2
#CVE-2022
[+] Implementation of CVE-2022-30190 in C
https://github.com/mattjmillner/CVE-Smackdown
[+] Exploit POC for CVE-2022-42055 for GL-iNet routers using firmware below 3.215
https://github.com/gigaryte/cve-2022-42055
@BlueRedTeam
[+] Implementation of CVE-2022-30190 in C
https://github.com/mattjmillner/CVE-Smackdown
[+] Exploit POC for CVE-2022-42055 for GL-iNet routers using firmware below 3.215
https://github.com/gigaryte/cve-2022-42055
@BlueRedTeam
GitHub
GitHub - mattjmillner/CVE-Smackdown: Implementation of CVE-2022-30190 in C
Implementation of CVE-2022-30190 in C. Contribute to mattjmillner/CVE-Smackdown development by creating an account on GitHub.
👍2
#Red_Team
BOF-pack-1
A care package of useful bofs for red team engagments .
https://github.com/jsecu/BOF-pack-1
@BlueRedTeam
BOF-pack-1
A care package of useful bofs for red team engagments .
https://github.com/jsecu/BOF-pack-1
@BlueRedTeam
GitHub
GitHub - jsecu/BOF-pack-1: A care package of useful bofs for red team engagments
A care package of useful bofs for red team engagments - jsecu/BOF-pack-1
#CVE-2022
A Shodan hunter for CVE-2022-40140
https://github.com/ipsBruno/CVE-2022-40140-SCANNER
@BlueRedTeam
A Shodan hunter for CVE-2022-40140
https://github.com/ipsBruno/CVE-2022-40140-SCANNER
@BlueRedTeam
GitHub
GitHub - ipsBruno/CVE-2022-40140-SCANNER: A Shodan hunter for CVE-2022-40140
A Shodan hunter for CVE-2022-40140 . Contribute to ipsBruno/CVE-2022-40140-SCANNER development by creating an account on GitHub.
#Red_Team
Active Directory Penetration Testing for Red Teams
https://github.com/PopLabSec/Active-Directory-Penetration-Testing
@BlueRedTeam
Active Directory Penetration Testing for Red Teams
https://github.com/PopLabSec/Active-Directory-Penetration-Testing
@BlueRedTeam
GitHub
GitHub - AD-Attacks/AD-Attacks-by-Service: Active Directory Penetration Testing for Red Teams
Active Directory Penetration Testing for Red Teams - AD-Attacks/AD-Attacks-by-Service
#Cobalt_Strike
Repository for archiving Cobalt Strike configuration
https://github.com/JPCERTCC/CobaltStrike-Config
@BlueRedTeam
Repository for archiving Cobalt Strike configuration
https://github.com/JPCERTCC/CobaltStrike-Config
@BlueRedTeam
GitHub
GitHub - JPCERTCC/CobaltStrike-Config: Repository for archiving Cobalt Strike configuration
Repository for archiving Cobalt Strike configuration - JPCERTCC/CobaltStrike-Config
👍1
#CVE-2022
Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)
https://github.com/cryxnet/CVE-2022-42889-RCE
@BlueRedTeam
Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)
https://github.com/cryxnet/CVE-2022-42889-RCE
@BlueRedTeam
GitHub
GitHub - cryxnet/CVE-2022-42889-RCE: Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)
Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability) - GitHub - cryxnet/CVE-2022-42889-RCE: Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)
#CVE-2022
Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215
https://github.com/gigaryte/cve-2022-31898
@BlueRedTeam
Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215
https://github.com/gigaryte/cve-2022-31898
@BlueRedTeam
GitHub
GitHub - gigaryte/cve-2022-31898: Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below…
Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215 - gigaryte/cve-2022-31898
👍2
👏2👍1