#Red_Team
An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal
https://github.com/machine1337/fudshell
@BlueRedTeam
An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal
https://github.com/machine1337/fudshell
@BlueRedTeam
GitHub
GitHub - machine1337/fudshell: An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated…
An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal - machine1337/fudshell
👍2
#Red_Team
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
https://github.com/PaulNorman01/Forensia
@BlueRedTeam
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
https://github.com/PaulNorman01/Forensia
@BlueRedTeam
GitHub
GitHub - PaulNorman01/Forensia: Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase. - PaulNorman01/Forensia
#Red_Team
Red Team Projects with chat.openai.com.
https://github.com/mgeeky/ProtectMyTooling
@BlueRedTeam
Red Team Projects with chat.openai.com.
https://github.com/mgeeky/ProtectMyTooling
@BlueRedTeam
GitHub
GitHub - mgeeky/ProtectMyTooling: Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented…
Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You fe...
👍1
#Red_Team
This is a repository for Penetration Test, Purple Team Exercise and Red Team
https://github.com/mturhanlar/turme
@BlueRedTeam
This is a repository for Penetration Test, Purple Team Exercise and Red Team
https://github.com/mturhanlar/turme
@BlueRedTeam
GitHub
GitHub - mturhanlar/turme: This is a repository for Penetration Test, Purple Team Exercise and Red Team
This is a repository for Penetration Test, Purple Team Exercise and Red Team - mturhanlar/turme
👍2👎1
#CVE-2022
CVE-2022-36537
https://github.com/agnihackers/CVE-2022-36537-EXPLOIT
POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.
https://github.com/Malwareman007/CVE-2022-21907
POC of CVE-2022-36537
https://github.com/Malwareman007/CVE-2022-36537
Dirty Pipe - CVE-2022-0847
https://github.com/tmoneypenny/CVE-2022-0847
Proof of concept of CVE-2022-24086
https://github.com/pescepilota/CVE-2022-24086
@BlueRedTeam
CVE-2022-36537
https://github.com/agnihackers/CVE-2022-36537-EXPLOIT
POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.
https://github.com/Malwareman007/CVE-2022-21907
POC of CVE-2022-36537
https://github.com/Malwareman007/CVE-2022-36537
Dirty Pipe - CVE-2022-0847
https://github.com/tmoneypenny/CVE-2022-0847
Proof of concept of CVE-2022-24086
https://github.com/pescepilota/CVE-2022-24086
@BlueRedTeam
GitHub
GitHub - agnihackers/CVE-2022-36537-EXPLOIT: CVE-2022-36537
CVE-2022-36537. Contribute to agnihackers/CVE-2022-36537-EXPLOIT development by creating an account on GitHub.
#Red_Team
Used to pull a summary CSV of an SRT's statistics on the Synack Red Team platform
https://github.com/h1pmnh/synstats
@BlueRedTeam
Used to pull a summary CSV of an SRT's statistics on the Synack Red Team platform
https://github.com/h1pmnh/synstats
@BlueRedTeam
GitHub
GitHub - h1pmnh/synstats: Used to pull a summary CSV of an SRT's statistics on the Synack Red Team platform
Used to pull a summary CSV of an SRT's statistics on the Synack Red Team platform - h1pmnh/synstats
دوستان اگر قصد تبادل دارید با ایدی زیر در ارتباط باشید :
@BRT01Chat_Bot
Friends, if you want to promo, contact the following ID: @BRT01Chat_Bot
@BRT01Chat_Bot
Friends, if you want to promo, contact the following ID: @BRT01Chat_Bot
#CVE-2022
7-Zip CVE-2022-29072 Mitigation - CHM file - This noscript detects if the .chm file exists and removes it.
https://github.com/Phantomiman/7-Zip.chm-mitigiation
#CVE-2022
PoC for Acronis Arbitrary File Read - CVE-2022-45451
https://github.com/alfarom256/CVE-2022-45451
#webshell
webshell alfa php
https://github.com/xstro04002/alfa-shell
CVE-2022-25765 pdfkit <0.8.6 command injection.
https://github.com/shamo0/PDFkit-CMD-Injection
Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.
https://github.com/Conradoduart3/Nft-Grabber-Stealer-Exploit-Cve-2022-Steal-BlockHain-Hack-Nft
@BlueRedTeam
7-Zip CVE-2022-29072 Mitigation - CHM file - This noscript detects if the .chm file exists and removes it.
https://github.com/Phantomiman/7-Zip.chm-mitigiation
#CVE-2022
PoC for Acronis Arbitrary File Read - CVE-2022-45451
https://github.com/alfarom256/CVE-2022-45451
#webshell
webshell alfa php
https://github.com/xstro04002/alfa-shell
CVE-2022-25765 pdfkit <0.8.6 command injection.
https://github.com/shamo0/PDFkit-CMD-Injection
Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.
https://github.com/Conradoduart3/Nft-Grabber-Stealer-Exploit-Cve-2022-Steal-BlockHain-Hack-Nft
@BlueRedTeam
GitHub
GitHub - Phantomiman/7-Zip.chm-Mitigation: 7-Zip CVE-2022-29072 Mitigation - CHM file - This noscript detects if the .chm file exists…
7-Zip CVE-2022-29072 Mitigation - CHM file - This noscript detects if the .chm file exists and removes it. - Phantomiman/7-Zip.chm-Mitigation
👍2
#Red_Team
A small Aggressor noscript to help Red Teams identify foreign processes on a host machine
https://github.com/Octoberfest7/Cohab_Processes
@BlueRedTeam
A small Aggressor noscript to help Red Teams identify foreign processes on a host machine
https://github.com/Octoberfest7/Cohab_Processes
@BlueRedTeam
GitHub
GitHub - Octoberfest7/Cohab_Processes: A small Aggressor noscript to help Red Teams identify foreign processes on a host machine
A small Aggressor noscript to help Red Teams identify foreign processes on a host machine - Octoberfest7/Cohab_Processes
👍1🔥1
#CVE-2022
TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
https://github.com/Live-Hack-CVE/CVE-2022-20607
TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
https://github.com/Live-Hack-CVE/CVE-2022-4646
PoC for the CVE-2022-41082 Vulnerability Effecting Microsoft Exchange Servers
https://github.com/balki97/CVE-2022-41082-POC
CVE-2022-2602
https://github.com/LukeGix/CVE-2022-2602
CVE-2022-2602
https://github.com/Live-Hack-CVE/CVE-2022-4633
TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
https://github.com/Live-Hack-CVE/CVE-2022-25574
CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM
https://github.com/Live-Hack-CVE/CVE-2022-36966
@BlueRedTeam
TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
https://github.com/Live-Hack-CVE/CVE-2022-20607
TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
https://github.com/Live-Hack-CVE/CVE-2022-4646
PoC for the CVE-2022-41082 Vulnerability Effecting Microsoft Exchange Servers
https://github.com/balki97/CVE-2022-41082-POC
CVE-2022-2602
https://github.com/LukeGix/CVE-2022-2602
CVE-2022-2602
https://github.com/Live-Hack-CVE/CVE-2022-4633
TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
https://github.com/Live-Hack-CVE/CVE-2022-25574
CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM
https://github.com/Live-Hack-CVE/CVE-2022-36966
@BlueRedTeam
👍1
#Red_Team
-- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality for blue and red teams
https://github.com/vaelwolf/CVE-2022-1388
@BlueRedTeam
-- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality for blue and red teams
https://github.com/vaelwolf/CVE-2022-1388
@BlueRedTeam
GitHub
GitHub - vaelwolf/CVE-2022-1388: -- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality…
-- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality for blue and red teams - vaelwolf/CVE-2022-1388
👍1
#CVE-2022
Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.
https://github.com/zhuowei/WDBFontOverwrite
This repo contains payload for the CVE-2022-36067
https://github.com/Prathamrajgor/Exploit-For-CVE-2022-36067
Proof of concept for CVE-2022-30190 (Follina).
https://github.com/winstxnhdw/CVE-2022-30190
@BlueRedTeam
Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.
https://github.com/zhuowei/WDBFontOverwrite
This repo contains payload for the CVE-2022-36067
https://github.com/Prathamrajgor/Exploit-For-CVE-2022-36067
Proof of concept for CVE-2022-30190 (Follina).
https://github.com/winstxnhdw/CVE-2022-30190
@BlueRedTeam
GitHub
GitHub - ginsudev/WDBFontOverwrite: Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.
Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689. - ginsudev/WDBFontOverwrite
👍2
#getshell
WBCE CMS v1.5.4 can implement getshell by modifying the upload file type. CVE project by
https://github.com/Live-Hack-CVE/CVE-2022-46020
#webshell
A polymorphic webshell generator
https://github.com/evaannn/delorean
@BlueRedTeam
WBCE CMS v1.5.4 can implement getshell by modifying the upload file type. CVE project by
@Sn0wAlicehttps://github.com/Live-Hack-CVE/CVE-2022-46020
#webshell
A polymorphic webshell generator
https://github.com/evaannn/delorean
@BlueRedTeam
#Red_Team
Sandman is a backdoor that meant to work on hardened networks during red team engagements.
Sandman works as a stager and leverages NTP (protocol to sync time & date) to download an arbitrary shellcode from a pre defined server.
Since NTP is a protocol that is overlooked by many defenders resulting wide network accessability.
https://github.com/Idov31/Sandman
@BlueRedTeam
Sandman is a backdoor that meant to work on hardened networks during red team engagements.
Sandman works as a stager and leverages NTP (protocol to sync time & date) to download an arbitrary shellcode from a pre defined server.
Since NTP is a protocol that is overlooked by many defenders resulting wide network accessability.
https://github.com/Idov31/Sandman
@BlueRedTeam
GitHub
GitHub - Idov31/Sandman: Sandman is a NTP based backdoor for hardened networks.
Sandman is a NTP based backdoor for hardened networks. - Idov31/Sandman
#Red_Team
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks
@BlueRedTeam
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks
@BlueRedTeam
GitHub
GitHub - 0xsyr0/Awesome-Cybersecurity-Handbooks: A huge chunk of my personal notes since I started playing CTFs and working as…
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer. - 0xsyr0/Awesome-Cybersecurity-Handbooks
🔥7