#Red_Team
A Golang version of the Rusty Recon Botfrom HuskyHacks' Responsible Red Teaming course.
https://github.com/An00bRektn/gopher-recon-bot
@BlueRedTeam
A Golang version of the Rusty Recon Botfrom HuskyHacks' Responsible Red Teaming course.
https://github.com/An00bRektn/gopher-recon-bot
@BlueRedTeam
GitHub
GitHub - An00bRektn/gopher-recon-bot: A Golang version of the Rusty Recon Bot from HuskyHacks' Responsible Red Teaming course.
A Golang version of the Rusty Recon Bot from HuskyHacks' Responsible Red Teaming course. - An00bRektn/gopher-recon-bot
👍3
Avoiding_Memory_Scanners.pdf
529.9 KB
#Red_Team
"Avoiding Memory Scanners: Customizing Malware to Evade YARA, PE-sieve, and More", 2022.
@BlueRedTeam
"Avoiding Memory Scanners: Customizing Malware to Evade YARA, PE-sieve, and More", 2022.
@BlueRedTeam
#Blue_Team
About Detection Engineering
https://cyb3rops.medium.com/about-detection-engineering-44d39e0755f0
@BlueRedTeam
About Detection Engineering
https://cyb3rops.medium.com/about-detection-engineering-44d39e0755f0
@BlueRedTeam
#Red_Team
+ A tool for generating fake code signing certificates or signing real ones
https://github.com/Tylous/Limelighter
+ PoC to invesitgate WMI process execution technique
https://github.com/daem0nc0re/TangledWinExec/tree/main/WmiSpawn
@BlueRedTeam
+ A tool for generating fake code signing certificates or signing real ones
https://github.com/Tylous/Limelighter
+ PoC to invesitgate WMI process execution technique
https://github.com/daem0nc0re/TangledWinExec/tree/main/WmiSpawn
@BlueRedTeam
GitHub
GitHub - Tylous/Limelighter: A tool for generating fake code signing certificates or signing real ones
A tool for generating fake code signing certificates or signing real ones - Tylous/Limelighter
❤2👍1
Some useful Telegram channels
@OsintBlackBox
If you are interested in OSINT, the content here will be useful for you.
@Iranian_Osint
If you are interested in OSINT, the content here will be useful for you.
@PfkGit
If you are looking for penetration testing tools, find them here.
@pfk_git
If you are looking for penetration testing tools, find them here.
@Netpentesters ( English )
If you want to become a Pinterester, join this channel.
@Netpentester (Iranian)
If you want to become a Pinterester, join this channel.
@Library_Sec
Library Cyber Security ( Free )
@OsintBlackBox
If you are interested in OSINT, the content here will be useful for you.
@Iranian_Osint
If you are interested in OSINT, the content here will be useful for you.
@PfkGit
If you are looking for penetration testing tools, find them here.
@pfk_git
If you are looking for penetration testing tools, find them here.
@Netpentesters ( English )
If you want to become a Pinterester, join this channel.
@Netpentester (Iranian)
If you want to become a Pinterester, join this channel.
@Library_Sec
Library Cyber Security ( Free )
👍2😁1
#Blue_Team
Sensitive Command Token
https://blog.thinkst.com/2022/09/sensitive-command-token-so-much-offense.html
@BlueRedTeam
Sensitive Command Token
https://blog.thinkst.com/2022/09/sensitive-command-token-so-much-offense.html
@BlueRedTeam
Thinkst Thoughts
Sensitive Command Token – So much offense in my defense
Introduction: Many people have pointed out that there are a handful of commands that are overwhelmingly run by attackers on compromised hosts (and seldom ever by regular users/usage). Reliably aler…
👍1
#CVE-2022
CVE-2022-39425 PoC
https://github.com/bob11vrdp/CVE-2022-39425
Detects attempts at exploitation of CVE-2022-3602, a remote code execution vulnerability in OpenSSL v 3.0.0 through v.3.0.6
https://github.com/corelight/CVE-2022-3602
@BlueRedTeam
CVE-2022-39425 PoC
https://github.com/bob11vrdp/CVE-2022-39425
Detects attempts at exploitation of CVE-2022-3602, a remote code execution vulnerability in OpenSSL v 3.0.0 through v.3.0.6
https://github.com/corelight/CVE-2022-3602
@BlueRedTeam
GitHub
GitHub - bob11vrdp/CVE-2022-39425: CVE-2022-39425 PoC
CVE-2022-39425 PoC. Contribute to bob11vrdp/CVE-2022-39425 development by creating an account on GitHub.
#Red_Team
An Introductory Repository for SNU Red Team. This Repository outlines the Prerequisites and Skills needed to join.
https://github.com/SNU-Red-Team/.github
@BlueRedTeam
An Introductory Repository for SNU Red Team. This Repository outlines the Prerequisites and Skills needed to join.
https://github.com/SNU-Red-Team/.github
@BlueRedTeam
GitHub
GitHub - SNUC-Zero-Day/.github: An Introductory Repository for SNU Red Team. This Repository outlines the Prerequisites and Skills…
An Introductory Repository for SNU Red Team. This Repository outlines the Prerequisites and Skills needed to join. - SNUC-Zero-Day/.github
#Cobalt_Strike
An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory.
https://github.com/CodeXTF2/ScreenshotBOF
@BlueRedTeam
An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory.
https://github.com/CodeXTF2/ScreenshotBOF
@BlueRedTeam
GitHub
GitHub - CodeXTF2/ScreenshotBOF: An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a…
An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory. - CodeXTF2/ScreenshotBOF
#CVE-2022
PoC for CVE-2021-31166 and CVE-2022-21907
https://github.com/0xmaximus/Home-Demolisher
@BlueRedTeam
PoC for CVE-2021-31166 and CVE-2022-21907
https://github.com/0xmaximus/Home-Demolisher
@BlueRedTeam
GitHub
GitHub - 0xmaximus/Home-Demolisher: PoC for CVE-2021-31166 and CVE-2022-21907
PoC for CVE-2021-31166 and CVE-2022-21907. Contribute to 0xmaximus/Home-Demolisher development by creating an account on GitHub.
👍1
#Red_Team
A library of Go functions for use on the Synack Red Team platform.
https://github.com/un4gi/synacklib
@BlueRedTeam
A library of Go functions for use on the Synack Red Team platform.
https://github.com/un4gi/synacklib
@BlueRedTeam
👍1
👍2
#CVE-2022
A Zeek CVE-2022-24491 detector.
https://github.com/corelight/CVE-2022-24491
writeup and PoC for (CVE-2022-41082/CVE-2022-41040) aka ProxyNotShell
https://github.com/Adynervi/CVE-2022-41082-RCE-PoC
Python Exploit for CVE-2022-0739
https://github.com/BKreisel/CVE-2022-0739
@BlueRedTeam
A Zeek CVE-2022-24491 detector.
https://github.com/corelight/CVE-2022-24491
writeup and PoC for (CVE-2022-41082/CVE-2022-41040) aka ProxyNotShell
https://github.com/Adynervi/CVE-2022-41082-RCE-PoC
Python Exploit for CVE-2022-0739
https://github.com/BKreisel/CVE-2022-0739
@BlueRedTeam
GitHub
GitHub - corelight/CVE-2022-24491: A Zeek CVE-2022-24491 detector.
A Zeek CVE-2022-24491 detector. Contribute to corelight/CVE-2022-24491 development by creating an account on GitHub.
#Red_Team
100 Red Team Projects for Pentesters and Network Managers
https://github.com/kurogai/100-redteam-projects
@BlueRedTeam
100 Red Team Projects for Pentesters and Network Managers
https://github.com/kurogai/100-redteam-projects
@BlueRedTeam
GitHub
GitHub - kurogai/100-redteam-projects: Projects for security students
Projects for security students. Contribute to kurogai/100-redteam-projects development by creating an account on GitHub.
😁1
#CVE-2022
writeup and PoC for (CVE-2022-41082/CVE-2022-41040) aka ProxyNotShell
https://github.com/Adynervi/CVE-2022-41082-RCE-PoC
Python Exploit for CVE-2022-0739
https://github.com/BKreisel/CVE-2022-0739
All details about CVE-2022-43097
https://github.com/nibin-m/CVE-2022-43097
CVE-2022-24112_POC
https://github.com/Acczdy/CVE-2022-24112_POC
@BlueRedTeam
writeup and PoC for (CVE-2022-41082/CVE-2022-41040) aka ProxyNotShell
https://github.com/Adynervi/CVE-2022-41082-RCE-PoC
Python Exploit for CVE-2022-0739
https://github.com/BKreisel/CVE-2022-0739
All details about CVE-2022-43097
https://github.com/nibin-m/CVE-2022-43097
CVE-2022-24112_POC
https://github.com/Acczdy/CVE-2022-24112_POC
@BlueRedTeam
GitHub
GitHub - BKreisel/CVE-2022-0739: 🐍 Python Exploit for CVE-2022-0739
🐍 Python Exploit for CVE-2022-0739. Contribute to BKreisel/CVE-2022-0739 development by creating an account on GitHub.
👍3
#Red_Team
Tools and Techniques for Red Team / Penetration Testing
https://github.com/avbernat/ocotillo-research
@BlueRedTeam
Tools and Techniques for Red Team / Penetration Testing
https://github.com/avbernat/ocotillo-research
@BlueRedTeam
GitHub
GitHub - avbernat/ocotillo-research: In the summer of 2019, our team embarked on a 2-3 week long trip across the American West.…
In the summer of 2019, our team embarked on a 2-3 week long trip across the American West. We conducted research on the one of the strangest woody shrubs in the Sonoran Desert near the Mexico-Unite...
👎1🔥1