#CVE-2023
PowerShell POC for CVE-2023-24055
https://github.com/ATTACKnDEFEND/CVE-2023-24055
PowerShell POC for CVE-2023-24055
https://github.com/Live-Hack-CVE/CVE-2023-22458
@BlueRedTeam
PowerShell POC for CVE-2023-24055
https://github.com/ATTACKnDEFEND/CVE-2023-24055
PowerShell POC for CVE-2023-24055
https://github.com/Live-Hack-CVE/CVE-2023-22458
@BlueRedTeam
GitHub
GitHub - duckbillsecurity/CVE-2023-24055: CVE-2023-24055 POC written in PowerShell.
CVE-2023-24055 POC written in PowerShell. Contribute to duckbillsecurity/CVE-2023-24055 development by creating an account on GitHub.
#webshell
the only php webshell you need.
https://github.com/oldkingcone/slopShell
webshell
https://github.com/guillefix/guillefix.me
@BlueRedTeam
the only php webshell you need.
https://github.com/oldkingcone/slopShell
webshell
https://github.com/guillefix/guillefix.me
@BlueRedTeam
GitHub
GitHub - oldkingcone/slopShell: the only php webshell you need.
the only php webshell you need. Contribute to oldkingcone/slopShell development by creating an account on GitHub.
😁2
#Cobalt_Strike
Collection of Beacon Object Files (BOF) for Cobalt Strike
https://github.com/REDMED-X/OperatorsKit
@BlueRedTeam
Collection of Beacon Object Files (BOF) for Cobalt Strike
https://github.com/REDMED-X/OperatorsKit
@BlueRedTeam
GitHub
GitHub - REDMED-X/OperatorsKit: Collection of Beacon Object Files (BOF) for Cobalt Strike
Collection of Beacon Object Files (BOF) for Cobalt Strike - REDMED-X/OperatorsKit
👍1
#CVE-2023
CVE-2023-24055 PoC (KeePass 2.5x)
https://github.com/alt3kx/CVE-2023-24055_PoC
CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.
https://github.com/0xf4n9x/CVE-2023-0669
@BlueRedTeam
CVE-2023-24055 PoC (KeePass 2.5x)
https://github.com/alt3kx/CVE-2023-24055_PoC
CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.
https://github.com/0xf4n9x/CVE-2023-0669
@BlueRedTeam
GitHub
GitHub - alt3kx/CVE-2023-24055_PoC: CVE-2023-24055 PoC (KeePass 2.5x)
CVE-2023-24055 PoC (KeePass 2.5x). Contribute to alt3kx/CVE-2023-24055_PoC development by creating an account on GitHub.
❤1👍1
#webshell
A PHP webshell to use when no exec-like functions is allowed
https://github.com/BorelEnzo/PoisonPrince
@BlueRedTeam
A PHP webshell to use when no exec-like functions is allowed
https://github.com/BorelEnzo/PoisonPrince
@BlueRedTeam
GitHub
GitHub - BorelEnzo/PoisonPrince: A PHP webshell to use when no exec-like function is allowed
A PHP webshell to use when no exec-like function is allowed - BorelEnzo/PoisonPrince
👍2
#Red_Team
S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
https://github.com/blackhatethicalhacking/S3cr3tDetect0rz
@BlueRedTeam
S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
https://github.com/blackhatethicalhacking/S3cr3tDetect0rz
@BlueRedTeam
GitHub
GitHub - blackhatethicalhacking/SecretOpt1c: SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites…
SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accuracy! - blackhatethicalhacking/SecretOpt1c
#CVE-2023
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
https://github.com/Malwareman007/CVE-2023-21608
@BlueRedTeam
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
https://github.com/Malwareman007/CVE-2023-21608
@BlueRedTeam
GitHub
GitHub - Malwareman007/CVE-2023-21608: Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit - Malwareman007/CVE-2023-21608
👍1
#Red_Team
Collection of PoC and offensive techniques used by the BlackArrow Red Team
https://github.com/blackarrowsec/redteam-research
@BlueRedTeam
Collection of PoC and offensive techniques used by the BlackArrow Red Team
https://github.com/blackarrowsec/redteam-research
@BlueRedTeam
GitHub
GitHub - blackarrowsec/redteam-research: Collection of PoC and offensive techniques used by the BlackArrow Red Team
Collection of PoC and offensive techniques used by the BlackArrow Red Team - blackarrowsec/redteam-research
👍1
#Red_Team
VagrantFile and supporting resources for building a Red Team kali image
https://github.com/dowrite/rtkali
@BlueRedTeam
VagrantFile and supporting resources for building a Red Team kali image
https://github.com/dowrite/rtkali
@BlueRedTeam
GitHub
GitHub - dowrite/rtkali: VagrantFile and supporting resources for building a Red Team kali image
VagrantFile and supporting resources for building a Red Team kali image - dowrite/rtkali
👍2🔥1
#Red_Team
Red Team utilities for setting up CWP CentOS 7 payload & reverse shell, as it refers to CVE-2022-44877
https://github.com/hotpotcookie/cwp-rce-white-box
@BlueRedTeam
Red Team utilities for setting up CWP CentOS 7 payload & reverse shell, as it refers to CVE-2022-44877
https://github.com/hotpotcookie/cwp-rce-white-box
@BlueRedTeam
GitHub
GitHub - hotpotcookie/CVE-2022-44877-white-box: Red Team utilities for setting up CWP CentOS 7 payload & reverse shell (Red Team…
Red Team utilities for setting up CWP CentOS 7 payload & reverse shell (Red Team 9 - CW2023) - hotpotcookie/CVE-2022-44877-white-box
If you are a skilled and experienced network penetration tester looking to connect with like-minded individuals for a meetup, please message me. Let's get acquainted and network.
Contact: @NetPwn
Contact: @NetPwn
❤3
#CVE-2023
CVE-2023-0669 GoAnywhere MFT command injection vulnerability
https://github.com/cataiovita/CVE-2023-0669
CVE-2023-0669 GoAnywhere MFT command injection vulnerability
https://github.com/Live-Hack-CVE/CVE-2023-22855
@BlueRedTeam
CVE-2023-0669 GoAnywhere MFT command injection vulnerability
https://github.com/cataiovita/CVE-2023-0669
CVE-2023-0669 GoAnywhere MFT command injection vulnerability
https://github.com/Live-Hack-CVE/CVE-2023-22855
@BlueRedTeam
GitHub
GitHub - cataliniovita/CVE-2023-0669: CVE-2023-0669 GoAnywhere MFT command injection vulnerability
CVE-2023-0669 GoAnywhere MFT command injection vulnerability - cataliniovita/CVE-2023-0669
👍2
#Red_Team
S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
https://github.com/ice-wzl/wmiexec2.0
@BlueRedTeam
S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
https://github.com/ice-wzl/wmiexec2.0
@BlueRedTeam
GitHub
GitHub - ice-wzl/wmiexec2: wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated…
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additiona...
#webshell
Linux emergency response/information collection/vulnerability detection tool, supports basic configuration/network traffic/task planning/environment variables/user information/Services/bash/malicious files/kernel Rootkit/SSH/Webshell/mining files/mining process /Supply chain/Server risk, etc. 13 categories and 70+ inspection items
https://github.com/al0ne/LinuxCheck
@BlueRedTeam
Linux emergency response/information collection/vulnerability detection tool, supports basic configuration/network traffic/task planning/environment variables/user information/Services/bash/malicious files/kernel Rootkit/SSH/Webshell/mining files/mining process /Supply chain/Server risk, etc. 13 categories and 70+ inspection items
https://github.com/al0ne/LinuxCheck
@BlueRedTeam
GitHub
GitHub - al0ne/LinuxCheck: Linux应急处置/信息搜集/漏洞检测工具,支持基础配置/网络流量/任务计划/环境变量/用户信息/Services/bash/恶意文件/内核Rootkit/SSH/Webshell/挖矿文件/挖矿进…
Linux应急处置/信息搜集/漏洞检测工具,支持基础配置/网络流量/任务计划/环境变量/用户信息/Services/bash/恶意文件/内核Rootkit/SSH/Webshell/挖矿文件/挖矿进程/供应链/服务器风险等13类70+项检查 - al0ne/LinuxCheck
Red Blue Team pinned «This channel is only about Red Team. Follow the contents of Blue Team from this @BlueTeamKit channel.»