#Red_Team
S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
https://github.com/blackhatethicalhacking/S3cr3tDetect0rz
@BlueRedTeam
S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
https://github.com/blackhatethicalhacking/S3cr3tDetect0rz
@BlueRedTeam
GitHub
GitHub - blackhatethicalhacking/SecretOpt1c: SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites…
SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accuracy! - blackhatethicalhacking/SecretOpt1c
#CVE-2023
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
https://github.com/Malwareman007/CVE-2023-21608
@BlueRedTeam
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
https://github.com/Malwareman007/CVE-2023-21608
@BlueRedTeam
GitHub
GitHub - Malwareman007/CVE-2023-21608: Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit - Malwareman007/CVE-2023-21608
👍1
#Red_Team
Collection of PoC and offensive techniques used by the BlackArrow Red Team
https://github.com/blackarrowsec/redteam-research
@BlueRedTeam
Collection of PoC and offensive techniques used by the BlackArrow Red Team
https://github.com/blackarrowsec/redteam-research
@BlueRedTeam
GitHub
GitHub - blackarrowsec/redteam-research: Collection of PoC and offensive techniques used by the BlackArrow Red Team
Collection of PoC and offensive techniques used by the BlackArrow Red Team - blackarrowsec/redteam-research
👍1
#Red_Team
VagrantFile and supporting resources for building a Red Team kali image
https://github.com/dowrite/rtkali
@BlueRedTeam
VagrantFile and supporting resources for building a Red Team kali image
https://github.com/dowrite/rtkali
@BlueRedTeam
GitHub
GitHub - dowrite/rtkali: VagrantFile and supporting resources for building a Red Team kali image
VagrantFile and supporting resources for building a Red Team kali image - dowrite/rtkali
👍2🔥1
#Red_Team
Red Team utilities for setting up CWP CentOS 7 payload & reverse shell, as it refers to CVE-2022-44877
https://github.com/hotpotcookie/cwp-rce-white-box
@BlueRedTeam
Red Team utilities for setting up CWP CentOS 7 payload & reverse shell, as it refers to CVE-2022-44877
https://github.com/hotpotcookie/cwp-rce-white-box
@BlueRedTeam
GitHub
GitHub - hotpotcookie/CVE-2022-44877-white-box: Red Team utilities for setting up CWP CentOS 7 payload & reverse shell (Red Team…
Red Team utilities for setting up CWP CentOS 7 payload & reverse shell (Red Team 9 - CW2023) - hotpotcookie/CVE-2022-44877-white-box
If you are a skilled and experienced network penetration tester looking to connect with like-minded individuals for a meetup, please message me. Let's get acquainted and network.
Contact: @NetPwn
Contact: @NetPwn
❤3
#CVE-2023
CVE-2023-0669 GoAnywhere MFT command injection vulnerability
https://github.com/cataiovita/CVE-2023-0669
CVE-2023-0669 GoAnywhere MFT command injection vulnerability
https://github.com/Live-Hack-CVE/CVE-2023-22855
@BlueRedTeam
CVE-2023-0669 GoAnywhere MFT command injection vulnerability
https://github.com/cataiovita/CVE-2023-0669
CVE-2023-0669 GoAnywhere MFT command injection vulnerability
https://github.com/Live-Hack-CVE/CVE-2023-22855
@BlueRedTeam
GitHub
GitHub - cataliniovita/CVE-2023-0669: CVE-2023-0669 GoAnywhere MFT command injection vulnerability
CVE-2023-0669 GoAnywhere MFT command injection vulnerability - cataliniovita/CVE-2023-0669
👍2
#Red_Team
S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
https://github.com/ice-wzl/wmiexec2.0
@BlueRedTeam
S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
https://github.com/ice-wzl/wmiexec2.0
@BlueRedTeam
GitHub
GitHub - ice-wzl/wmiexec2: wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated…
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additiona...
#webshell
Linux emergency response/information collection/vulnerability detection tool, supports basic configuration/network traffic/task planning/environment variables/user information/Services/bash/malicious files/kernel Rootkit/SSH/Webshell/mining files/mining process /Supply chain/Server risk, etc. 13 categories and 70+ inspection items
https://github.com/al0ne/LinuxCheck
@BlueRedTeam
Linux emergency response/information collection/vulnerability detection tool, supports basic configuration/network traffic/task planning/environment variables/user information/Services/bash/malicious files/kernel Rootkit/SSH/Webshell/mining files/mining process /Supply chain/Server risk, etc. 13 categories and 70+ inspection items
https://github.com/al0ne/LinuxCheck
@BlueRedTeam
GitHub
GitHub - al0ne/LinuxCheck: Linux应急处置/信息搜集/漏洞检测工具,支持基础配置/网络流量/任务计划/环境变量/用户信息/Services/bash/恶意文件/内核Rootkit/SSH/Webshell/挖矿文件/挖矿进…
Linux应急处置/信息搜集/漏洞检测工具,支持基础配置/网络流量/任务计划/环境变量/用户信息/Services/bash/恶意文件/内核Rootkit/SSH/Webshell/挖矿文件/挖矿进程/供应链/服务器风险等13类70+项检查 - al0ne/LinuxCheck
Red Blue Team pinned «This channel is only about Red Team. Follow the contents of Blue Team from this @BlueTeamKit channel.»
Forwarded from Open Source intelligence [ OSINT ]
Beginners Field Guide: Where & How to Learn OSINT
This is not a comprehensive collection of resources. This collection is based on my own time spent on open-source intelligence. There are a million links with OSINT tools that can get the job done but this post is curated to point you in the right direction to obtain the necessary skills and mindset to get the job done. — EXTRA SECTION — FRAMEWORK FOR BEGINNERS
https://medium.com/the-sleuth-sheet/beginners-field-guide-where-how-to-learn-osint-bd2e11469f31
@OsintBlackBox
This is not a comprehensive collection of resources. This collection is based on my own time spent on open-source intelligence. There are a million links with OSINT tools that can get the job done but this post is curated to point you in the right direction to obtain the necessary skills and mindset to get the job done. — EXTRA SECTION — FRAMEWORK FOR BEGINNERS
https://medium.com/the-sleuth-sheet/beginners-field-guide-where-how-to-learn-osint-bd2e11469f31
@OsintBlackBox
Medium
Beginners Field Guide: Where & How to Learn OSINT
Discover, Uncover, Analyze: Master OSINT, Empower Intelligence Skills.
#Red_Team
These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming
https://github.com/sho-luv/chatgpt_created_tools
@BlueRedTeam
These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming
https://github.com/sho-luv/chatgpt_created_tools
@BlueRedTeam
GitHub
GitHub - sho-luv/gpt_tools: These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming
These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming - sho-luv/gpt_tools
👍1
#CVE-2023
CVE-2023-0669 Encrpytion helper
https://github.com/yosef0x01/CVE-2023-0669
Poc for CVE-2023-23752 (joomla CMS)
https://github.com/WhiteOwl-Pub/CVE-2023-23752
@BlueRedTeam
CVE-2023-0669 Encrpytion helper
https://github.com/yosef0x01/CVE-2023-0669
Poc for CVE-2023-23752 (joomla CMS)
https://github.com/WhiteOwl-Pub/CVE-2023-23752
@BlueRedTeam
#webshell
php webshell
https://github.com/n01ep3rz/upsilon-shell
webshell
https://github.com/cannibal-hannibal/Tess
A secure webshell
https://github.com/mickael-kerjean/webpty
@BlueRedTeam
php webshell
https://github.com/n01ep3rz/upsilon-shell
webshell
https://github.com/cannibal-hannibal/Tess
A secure webshell
https://github.com/mickael-kerjean/webpty
@BlueRedTeam
❤1👍1