#webshell
Various webshells. We accept pull requests for additions to this collection.
https://github.com/BlackArch/webshells
@BlueRedTeam
Various webshells. We accept pull requests for additions to this collection.
https://github.com/BlackArch/webshells
@BlueRedTeam
GitHub
GitHub - BlackArch/webshells: Various webshells. We accept pull requests for additions to this collection.
Various webshells. We accept pull requests for additions to this collection. - BlackArch/webshells
#CVE-2023
POC and Scanner for CVE-2023-24055
https://github.com/deetl/CVE-2023-24055
CVE-2023-21839 exp
https://github.com/fakenews2025/CVE-2023-21839
CVE-2023-23132
https://github.com/l00neyhacker/CVE-2023-23132
@BlueRedTeam
POC and Scanner for CVE-2023-24055
https://github.com/deetl/CVE-2023-24055
CVE-2023-21839 exp
https://github.com/fakenews2025/CVE-2023-21839
CVE-2023-23132
https://github.com/l00neyhacker/CVE-2023-23132
@BlueRedTeam
GitHub
GitHub - deetl/CVE-2023-24055: POC and Scanner for CVE-2023-24055
POC and Scanner for CVE-2023-24055. Contribute to deetl/CVE-2023-24055 development by creating an account on GitHub.
👍1
#Red_Team
Collection of OPSEC Tradecraft and TTPs for Red Team Operations
https://github.com/hack-with-ethics/dns-recon-dns-redTeaming
@BlueRedTeam
Collection of OPSEC Tradecraft and TTPs for Red Team Operations
https://github.com/hack-with-ethics/dns-recon-dns-redTeaming
@BlueRedTeam
GitHub
GitHub - hack-with-ethics/dns-recon-dns-redTeaming: This is a Python noscript that provides the ability to perform: Check all NS…
This is a Python noscript that provides the ability to perform: Check all NS Records for Zone Transfers. Enumerate General DNS Records for a given Domain (MX, SOA, NS, A, AAAA, SPF and TXT). Perform ...
👍1
#Cobalt_Strike
Toolset for research malware and Cobalt Strike beacons
https://github.com/RomanEmelyanov/CobaltStrikeForensic
@BlueRedTeam
Toolset for research malware and Cobalt Strike beacons
https://github.com/RomanEmelyanov/CobaltStrikeForensic
@BlueRedTeam
GitHub
GitHub - RomanEmelyanov/CobaltStrikeForensic: Toolset for research malware and Cobalt Strike beacons
Toolset for research malware and Cobalt Strike beacons - RomanEmelyanov/CobaltStrikeForensic
👍1
#CVE-2023
This is a proof of concept for CVE-2023-24610
https://github.com/abbisQQ/CVE-2023-24610
CVE-2023-23924 PoC
https://github.com/motikan2010/CVE-2023-23924
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-20916
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-22664
@BlueRedTeam
This is a proof of concept for CVE-2023-24610
https://github.com/abbisQQ/CVE-2023-24610
CVE-2023-23924 PoC
https://github.com/motikan2010/CVE-2023-23924
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-20916
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-22664
@BlueRedTeam
GitHub
GitHub - abbisQQ/CVE-2023-24610: This is a proof of concept for CVE-2023-24610
This is a proof of concept for CVE-2023-24610. Contribute to abbisQQ/CVE-2023-24610 development by creating an account on GitHub.
#Red_Team
This is a template to show how the Red Team will structure files
https://github.com/stevenshow/File-Structure
@BlueRedTeam
This is a template to show how the Red Team will structure files
https://github.com/stevenshow/File-Structure
@BlueRedTeam
GitHub
GitHub - stevenshow/File-Structure: This is a template to show how the Red Team will structure files
This is a template to show how the Red Team will structure files - stevenshow/File-Structure
#Red_Team
This is a template to show how the Red Team will structure files
https://github.com/halbeeb/Cloud-Warehouse-AWS-Redshift
@BlueRedTeam
This is a template to show how the Red Team will structure files
https://github.com/halbeeb/Cloud-Warehouse-AWS-Redshift
@BlueRedTeam
GitHub
GitHub - halbeeb/Cloud-Warehouse-AWS-Redshift: This project builds an ELT pipeline that extracts data from S3, stages them in Redshift…
This project builds an ELT pipeline that extracts data from S3, stages them in Redshift, and transforms data into a set of dimensional tables for Sparkify analytics team to continue finding insight...
👍3
This channel is only about Red Team.
Follow the contents of Blue Team from this @BlueTeamKit channel.
Follow the contents of Blue Team from this @BlueTeamKit channel.
👍7
#CVE-2023
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-20916
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-22664
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
https://github.com/hacksysteam/CVE-2023-21608
@BlueRedTeam
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-20916
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-22664
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
https://github.com/hacksysteam/CVE-2023-21608
@BlueRedTeam
GitHub
GitHub - hacksysteam/CVE-2023-21608: Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit - hacksysteam/CVE-2023-21608
👍1
#CVE-2023
PowerShell POC for CVE-2023-24055
https://github.com/ATTACKnDEFEND/CVE-2023-24055
PowerShell POC for CVE-2023-24055
https://github.com/Live-Hack-CVE/CVE-2023-22458
@BlueRedTeam
PowerShell POC for CVE-2023-24055
https://github.com/ATTACKnDEFEND/CVE-2023-24055
PowerShell POC for CVE-2023-24055
https://github.com/Live-Hack-CVE/CVE-2023-22458
@BlueRedTeam
GitHub
GitHub - duckbillsecurity/CVE-2023-24055: CVE-2023-24055 POC written in PowerShell.
CVE-2023-24055 POC written in PowerShell. Contribute to duckbillsecurity/CVE-2023-24055 development by creating an account on GitHub.
#webshell
the only php webshell you need.
https://github.com/oldkingcone/slopShell
webshell
https://github.com/guillefix/guillefix.me
@BlueRedTeam
the only php webshell you need.
https://github.com/oldkingcone/slopShell
webshell
https://github.com/guillefix/guillefix.me
@BlueRedTeam
GitHub
GitHub - oldkingcone/slopShell: the only php webshell you need.
the only php webshell you need. Contribute to oldkingcone/slopShell development by creating an account on GitHub.
😁2
#Cobalt_Strike
Collection of Beacon Object Files (BOF) for Cobalt Strike
https://github.com/REDMED-X/OperatorsKit
@BlueRedTeam
Collection of Beacon Object Files (BOF) for Cobalt Strike
https://github.com/REDMED-X/OperatorsKit
@BlueRedTeam
GitHub
GitHub - REDMED-X/OperatorsKit: Collection of Beacon Object Files (BOF) for Cobalt Strike
Collection of Beacon Object Files (BOF) for Cobalt Strike - REDMED-X/OperatorsKit
👍1
#CVE-2023
CVE-2023-24055 PoC (KeePass 2.5x)
https://github.com/alt3kx/CVE-2023-24055_PoC
CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.
https://github.com/0xf4n9x/CVE-2023-0669
@BlueRedTeam
CVE-2023-24055 PoC (KeePass 2.5x)
https://github.com/alt3kx/CVE-2023-24055_PoC
CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.
https://github.com/0xf4n9x/CVE-2023-0669
@BlueRedTeam
GitHub
GitHub - alt3kx/CVE-2023-24055_PoC: CVE-2023-24055 PoC (KeePass 2.5x)
CVE-2023-24055 PoC (KeePass 2.5x). Contribute to alt3kx/CVE-2023-24055_PoC development by creating an account on GitHub.
❤1👍1
#webshell
A PHP webshell to use when no exec-like functions is allowed
https://github.com/BorelEnzo/PoisonPrince
@BlueRedTeam
A PHP webshell to use when no exec-like functions is allowed
https://github.com/BorelEnzo/PoisonPrince
@BlueRedTeam
GitHub
GitHub - BorelEnzo/PoisonPrince: A PHP webshell to use when no exec-like function is allowed
A PHP webshell to use when no exec-like function is allowed - BorelEnzo/PoisonPrince
👍2
#Red_Team
S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
https://github.com/blackhatethicalhacking/S3cr3tDetect0rz
@BlueRedTeam
S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
https://github.com/blackhatethicalhacking/S3cr3tDetect0rz
@BlueRedTeam
GitHub
GitHub - blackhatethicalhacking/SecretOpt1c: SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites…
SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accuracy! - blackhatethicalhacking/SecretOpt1c
#CVE-2023
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
https://github.com/Malwareman007/CVE-2023-21608
@BlueRedTeam
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
https://github.com/Malwareman007/CVE-2023-21608
@BlueRedTeam
GitHub
GitHub - Malwareman007/CVE-2023-21608: Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit - Malwareman007/CVE-2023-21608
👍1