Donate
💰Monero Wallet :
4BEJqJ2doayRBYJwmQzp59AhsGgpm9gb7PP5uCR6zA7u9Qy8VzUzVNDitJtMVF2ALnBrRbGkuXcoLaguhL2aoeno32RUSBM
💰Monero Wallet :
4BEJqJ2doayRBYJwmQzp59AhsGgpm9gb7PP5uCR6zA7u9Qy8VzUzVNDitJtMVF2ALnBrRbGkuXcoLaguhL2aoeno32RUSBM
👍2
#CVE-2022
Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3
https://github.com/NCSC-NL/OpenSSL-2022
@BlueRedTeam
Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3
https://github.com/NCSC-NL/OpenSSL-2022
@BlueRedTeam
GitHub
GitHub - NCSC-NL/OpenSSL-2022: Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL…
Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3 - NCSC-NL/OpenSSL-2022
Some useful Telegram channels
@OsintBlackBox
If you are interested in OSINT, the content here will be useful for you.
@Iranian_Osint
If you are interested in OSINT, the content here will be useful for you.
@PfkGit
If you are looking for penetration testing tools, find them here.
@pfk_git
If you are looking for penetration testing tools, find them here.
@Netpentesters ( English )
If you want to become a Pinterester, join this channel.
@Netpentester (Iranian)
If you want to become a Pinterester, join this channel.
@library_Sec
The largest cyber security library in Telegram.
@BlueRedTeam
Red Team and BlueTeam specialized reference.
@Pfk_0day
Learn Cyber Security ( Free )
@OsintBlackBox
If you are interested in OSINT, the content here will be useful for you.
@Iranian_Osint
If you are interested in OSINT, the content here will be useful for you.
@PfkGit
If you are looking for penetration testing tools, find them here.
@pfk_git
If you are looking for penetration testing tools, find them here.
@Netpentesters ( English )
If you want to become a Pinterester, join this channel.
@Netpentester (Iranian)
If you want to become a Pinterester, join this channel.
@library_Sec
The largest cyber security library in Telegram.
@BlueRedTeam
Red Team and BlueTeam specialized reference.
@Pfk_0day
Learn Cyber Security ( Free )
👍1
#Red_Team
A folder to serve tools from during PT/Red Team engagements. Contains common executables and noscripts for privesc, recon, pivoting and CVE exploitation.
https://github.com/tonyarris/srv
@BlueRedTem
A folder to serve tools from during PT/Red Team engagements. Contains common executables and noscripts for privesc, recon, pivoting and CVE exploitation.
https://github.com/tonyarris/srv
@BlueRedTem
GitHub
GitHub - tonyarris/srv: A folder to serve tools from during PT/Red Team engagements. Contains common executables and noscripts for…
A folder to serve tools from during PT/Red Team engagements. Contains common executables and noscripts for privesc, recon, pivoting and CVE exploitation. - tonyarris/srv
🥰3
#Red_Team
A Golang version of the Rusty Recon Botfrom HuskyHacks' Responsible Red Teaming course.
https://github.com/An00bRektn/gopher-recon-bot
@BlueRedTeam
A Golang version of the Rusty Recon Botfrom HuskyHacks' Responsible Red Teaming course.
https://github.com/An00bRektn/gopher-recon-bot
@BlueRedTeam
GitHub
GitHub - An00bRektn/gopher-recon-bot: A Golang version of the Rusty Recon Bot from HuskyHacks' Responsible Red Teaming course.
A Golang version of the Rusty Recon Bot from HuskyHacks' Responsible Red Teaming course. - An00bRektn/gopher-recon-bot
👍3
Avoiding_Memory_Scanners.pdf
529.9 KB
#Red_Team
"Avoiding Memory Scanners: Customizing Malware to Evade YARA, PE-sieve, and More", 2022.
@BlueRedTeam
"Avoiding Memory Scanners: Customizing Malware to Evade YARA, PE-sieve, and More", 2022.
@BlueRedTeam
#Blue_Team
About Detection Engineering
https://cyb3rops.medium.com/about-detection-engineering-44d39e0755f0
@BlueRedTeam
About Detection Engineering
https://cyb3rops.medium.com/about-detection-engineering-44d39e0755f0
@BlueRedTeam
#Red_Team
+ A tool for generating fake code signing certificates or signing real ones
https://github.com/Tylous/Limelighter
+ PoC to invesitgate WMI process execution technique
https://github.com/daem0nc0re/TangledWinExec/tree/main/WmiSpawn
@BlueRedTeam
+ A tool for generating fake code signing certificates or signing real ones
https://github.com/Tylous/Limelighter
+ PoC to invesitgate WMI process execution technique
https://github.com/daem0nc0re/TangledWinExec/tree/main/WmiSpawn
@BlueRedTeam
GitHub
GitHub - Tylous/Limelighter: A tool for generating fake code signing certificates or signing real ones
A tool for generating fake code signing certificates or signing real ones - Tylous/Limelighter
❤2👍1
Some useful Telegram channels
@OsintBlackBox
If you are interested in OSINT, the content here will be useful for you.
@Iranian_Osint
If you are interested in OSINT, the content here will be useful for you.
@PfkGit
If you are looking for penetration testing tools, find them here.
@pfk_git
If you are looking for penetration testing tools, find them here.
@Netpentesters ( English )
If you want to become a Pinterester, join this channel.
@Netpentester (Iranian)
If you want to become a Pinterester, join this channel.
@Library_Sec
Library Cyber Security ( Free )
@OsintBlackBox
If you are interested in OSINT, the content here will be useful for you.
@Iranian_Osint
If you are interested in OSINT, the content here will be useful for you.
@PfkGit
If you are looking for penetration testing tools, find them here.
@pfk_git
If you are looking for penetration testing tools, find them here.
@Netpentesters ( English )
If you want to become a Pinterester, join this channel.
@Netpentester (Iranian)
If you want to become a Pinterester, join this channel.
@Library_Sec
Library Cyber Security ( Free )
👍2😁1
#Blue_Team
Sensitive Command Token
https://blog.thinkst.com/2022/09/sensitive-command-token-so-much-offense.html
@BlueRedTeam
Sensitive Command Token
https://blog.thinkst.com/2022/09/sensitive-command-token-so-much-offense.html
@BlueRedTeam
Thinkst Thoughts
Sensitive Command Token – So much offense in my defense
Introduction: Many people have pointed out that there are a handful of commands that are overwhelmingly run by attackers on compromised hosts (and seldom ever by regular users/usage). Reliably aler…
👍1
#CVE-2022
CVE-2022-39425 PoC
https://github.com/bob11vrdp/CVE-2022-39425
Detects attempts at exploitation of CVE-2022-3602, a remote code execution vulnerability in OpenSSL v 3.0.0 through v.3.0.6
https://github.com/corelight/CVE-2022-3602
@BlueRedTeam
CVE-2022-39425 PoC
https://github.com/bob11vrdp/CVE-2022-39425
Detects attempts at exploitation of CVE-2022-3602, a remote code execution vulnerability in OpenSSL v 3.0.0 through v.3.0.6
https://github.com/corelight/CVE-2022-3602
@BlueRedTeam
GitHub
GitHub - bob11vrdp/CVE-2022-39425: CVE-2022-39425 PoC
CVE-2022-39425 PoC. Contribute to bob11vrdp/CVE-2022-39425 development by creating an account on GitHub.
#Red_Team
An Introductory Repository for SNU Red Team. This Repository outlines the Prerequisites and Skills needed to join.
https://github.com/SNU-Red-Team/.github
@BlueRedTeam
An Introductory Repository for SNU Red Team. This Repository outlines the Prerequisites and Skills needed to join.
https://github.com/SNU-Red-Team/.github
@BlueRedTeam
GitHub
GitHub - SNUC-Zero-Day/.github: An Introductory Repository for SNU Red Team. This Repository outlines the Prerequisites and Skills…
An Introductory Repository for SNU Red Team. This Repository outlines the Prerequisites and Skills needed to join. - SNUC-Zero-Day/.github
#Cobalt_Strike
An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory.
https://github.com/CodeXTF2/ScreenshotBOF
@BlueRedTeam
An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory.
https://github.com/CodeXTF2/ScreenshotBOF
@BlueRedTeam
GitHub
GitHub - CodeXTF2/ScreenshotBOF: An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a…
An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory. - CodeXTF2/ScreenshotBOF
#CVE-2022
PoC for CVE-2021-31166 and CVE-2022-21907
https://github.com/0xmaximus/Home-Demolisher
@BlueRedTeam
PoC for CVE-2021-31166 and CVE-2022-21907
https://github.com/0xmaximus/Home-Demolisher
@BlueRedTeam
GitHub
GitHub - 0xmaximus/Home-Demolisher: PoC for CVE-2021-31166 and CVE-2022-21907
PoC for CVE-2021-31166 and CVE-2022-21907. Contribute to 0xmaximus/Home-Demolisher development by creating an account on GitHub.
👍1