#Red_Team
BOF-pack-1
A care package of useful bofs for red team engagments .
https://github.com/jsecu/BOF-pack-1
@BlueRedTeam
BOF-pack-1
A care package of useful bofs for red team engagments .
https://github.com/jsecu/BOF-pack-1
@BlueRedTeam
GitHub
GitHub - jsecu/BOF-pack-1: A care package of useful bofs for red team engagments
A care package of useful bofs for red team engagments - jsecu/BOF-pack-1
#CVE-2022
A Shodan hunter for CVE-2022-40140
https://github.com/ipsBruno/CVE-2022-40140-SCANNER
@BlueRedTeam
A Shodan hunter for CVE-2022-40140
https://github.com/ipsBruno/CVE-2022-40140-SCANNER
@BlueRedTeam
GitHub
GitHub - ipsBruno/CVE-2022-40140-SCANNER: A Shodan hunter for CVE-2022-40140
A Shodan hunter for CVE-2022-40140 . Contribute to ipsBruno/CVE-2022-40140-SCANNER development by creating an account on GitHub.
#Red_Team
Active Directory Penetration Testing for Red Teams
https://github.com/PopLabSec/Active-Directory-Penetration-Testing
@BlueRedTeam
Active Directory Penetration Testing for Red Teams
https://github.com/PopLabSec/Active-Directory-Penetration-Testing
@BlueRedTeam
GitHub
GitHub - AD-Attacks/AD-Attacks-by-Service: Active Directory Penetration Testing for Red Teams
Active Directory Penetration Testing for Red Teams - AD-Attacks/AD-Attacks-by-Service
#Cobalt_Strike
Repository for archiving Cobalt Strike configuration
https://github.com/JPCERTCC/CobaltStrike-Config
@BlueRedTeam
Repository for archiving Cobalt Strike configuration
https://github.com/JPCERTCC/CobaltStrike-Config
@BlueRedTeam
GitHub
GitHub - JPCERTCC/CobaltStrike-Config: Repository for archiving Cobalt Strike configuration
Repository for archiving Cobalt Strike configuration - JPCERTCC/CobaltStrike-Config
👍1
#CVE-2022
Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)
https://github.com/cryxnet/CVE-2022-42889-RCE
@BlueRedTeam
Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)
https://github.com/cryxnet/CVE-2022-42889-RCE
@BlueRedTeam
GitHub
GitHub - cryxnet/CVE-2022-42889-RCE: Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)
Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability) - GitHub - cryxnet/CVE-2022-42889-RCE: Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)
#CVE-2022
Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215
https://github.com/gigaryte/cve-2022-31898
@BlueRedTeam
Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215
https://github.com/gigaryte/cve-2022-31898
@BlueRedTeam
GitHub
GitHub - gigaryte/cve-2022-31898: Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below…
Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215 - gigaryte/cve-2022-31898
👍2
👏2👍1
#CVE-2022
Escaping a Docker Container by using CVE-2016-3714 and CVE-2022-0492.
https://github.com/SgtMate/container_escape_showcase
@BlueRedTeam
Escaping a Docker Container by using CVE-2016-3714 and CVE-2022-0492.
https://github.com/SgtMate/container_escape_showcase
@BlueRedTeam
GitHub
GitHub - SgtMate/container_escape_showcase: Escaping a Docker Container for fun.
Escaping a Docker Container for fun. Contribute to SgtMate/container_escape_showcase development by creating an account on GitHub.
👍2
#Cobalt_Strike
A Cobalt Strike memory evasion loader for redteamers
https://github.com/ShadowMccc/MemoryEvasion
@BlueRedTeam
A Cobalt Strike memory evasion loader for redteamers
https://github.com/ShadowMccc/MemoryEvasion
@BlueRedTeam
GitHub
GitHub - ShadowMccc/MemoryEvasion: A Cobalt Strike memory evasion loader for redteamers
A Cobalt Strike memory evasion loader for redteamers - ShadowMccc/MemoryEvasion
❤1👍1
👎1
#CVE-2022
CVE-2022-0441 - MasterStudy LMS 2.7.6
https://github.com/SDragon1205/cve-2022-0441
@BlueRedTeam
CVE-2022-0441 - MasterStudy LMS 2.7.6
https://github.com/SDragon1205/cve-2022-0441
@BlueRedTeam
GitHub
GitHub - SDragon1205/cve-2022-0441: CVE-2022-0441 - MasterStudy LMS 2.7.6
CVE-2022-0441 - MasterStudy LMS 2.7.6. Contribute to SDragon1205/cve-2022-0441 development by creating an account on GitHub.
Donate
💰Monero Wallet :
4BEJqJ2doayRBYJwmQzp59AhsGgpm9gb7PP5uCR6zA7u9Qy8VzUzVNDitJtMVF2ALnBrRbGkuXcoLaguhL2aoeno32RUSBM
💰Monero Wallet :
4BEJqJ2doayRBYJwmQzp59AhsGgpm9gb7PP5uCR6zA7u9Qy8VzUzVNDitJtMVF2ALnBrRbGkuXcoLaguhL2aoeno32RUSBM
👍2
#CVE-2022
Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3
https://github.com/NCSC-NL/OpenSSL-2022
@BlueRedTeam
Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3
https://github.com/NCSC-NL/OpenSSL-2022
@BlueRedTeam
GitHub
GitHub - NCSC-NL/OpenSSL-2022: Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL…
Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3 - NCSC-NL/OpenSSL-2022