👍2🔥1
#Red_Team
Red Team utilities for setting up CWP CentOS 7 payload & reverse shell, as it refers to CVE-2022-44877
https://github.com/hotpotcookie/cwp-rce-white-box
@BlueRedTeam
Red Team utilities for setting up CWP CentOS 7 payload & reverse shell, as it refers to CVE-2022-44877
https://github.com/hotpotcookie/cwp-rce-white-box
@BlueRedTeam
GitHub
GitHub - hotpotcookie/CVE-2022-44877-white-box: Red Team utilities for setting up CWP CentOS 7 payload & reverse shell (Red Team…
Red Team utilities for setting up CWP CentOS 7 payload & reverse shell (Red Team 9 - CW2023) - hotpotcookie/CVE-2022-44877-white-box
If you are a skilled and experienced network penetration tester looking to connect with like-minded individuals for a meetup, please message me. Let's get acquainted and network.
Contact: @NetPwn
Contact: @NetPwn
❤3
#CVE-2023
CVE-2023-0669 GoAnywhere MFT command injection vulnerability
https://github.com/cataiovita/CVE-2023-0669
CVE-2023-0669 GoAnywhere MFT command injection vulnerability
https://github.com/Live-Hack-CVE/CVE-2023-22855
@BlueRedTeam
CVE-2023-0669 GoAnywhere MFT command injection vulnerability
https://github.com/cataiovita/CVE-2023-0669
CVE-2023-0669 GoAnywhere MFT command injection vulnerability
https://github.com/Live-Hack-CVE/CVE-2023-22855
@BlueRedTeam
GitHub
GitHub - cataliniovita/CVE-2023-0669: CVE-2023-0669 GoAnywhere MFT command injection vulnerability
CVE-2023-0669 GoAnywhere MFT command injection vulnerability - cataliniovita/CVE-2023-0669
👍2
#Red_Team
S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
https://github.com/ice-wzl/wmiexec2.0
@BlueRedTeam
S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
https://github.com/ice-wzl/wmiexec2.0
@BlueRedTeam
GitHub
GitHub - ice-wzl/wmiexec2: wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated…
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additiona...
#webshell
Linux emergency response/information collection/vulnerability detection tool, supports basic configuration/network traffic/task planning/environment variables/user information/Services/bash/malicious files/kernel Rootkit/SSH/Webshell/mining files/mining process /Supply chain/Server risk, etc. 13 categories and 70+ inspection items
https://github.com/al0ne/LinuxCheck
@BlueRedTeam
Linux emergency response/information collection/vulnerability detection tool, supports basic configuration/network traffic/task planning/environment variables/user information/Services/bash/malicious files/kernel Rootkit/SSH/Webshell/mining files/mining process /Supply chain/Server risk, etc. 13 categories and 70+ inspection items
https://github.com/al0ne/LinuxCheck
@BlueRedTeam
GitHub
GitHub - al0ne/LinuxCheck: Linux应急处置/信息搜集/漏洞检测工具,支持基础配置/网络流量/任务计划/环境变量/用户信息/Services/bash/恶意文件/内核Rootkit/SSH/Webshell/挖矿文件/挖矿进…
Linux应急处置/信息搜集/漏洞检测工具,支持基础配置/网络流量/任务计划/环境变量/用户信息/Services/bash/恶意文件/内核Rootkit/SSH/Webshell/挖矿文件/挖矿进程/供应链/服务器风险等13类70+项检查 - al0ne/LinuxCheck
Red Blue Team pinned «This channel is only about Red Team. Follow the contents of Blue Team from this @BlueTeamKit channel.»
Forwarded from Open Source intelligence [ OSINT ]
Beginners Field Guide: Where & How to Learn OSINT
This is not a comprehensive collection of resources. This collection is based on my own time spent on open-source intelligence. There are a million links with OSINT tools that can get the job done but this post is curated to point you in the right direction to obtain the necessary skills and mindset to get the job done. — EXTRA SECTION — FRAMEWORK FOR BEGINNERS
https://medium.com/the-sleuth-sheet/beginners-field-guide-where-how-to-learn-osint-bd2e11469f31
@OsintBlackBox
This is not a comprehensive collection of resources. This collection is based on my own time spent on open-source intelligence. There are a million links with OSINT tools that can get the job done but this post is curated to point you in the right direction to obtain the necessary skills and mindset to get the job done. — EXTRA SECTION — FRAMEWORK FOR BEGINNERS
https://medium.com/the-sleuth-sheet/beginners-field-guide-where-how-to-learn-osint-bd2e11469f31
@OsintBlackBox
Medium
Beginners Field Guide: Where & How to Learn OSINT
Discover, Uncover, Analyze: Master OSINT, Empower Intelligence Skills.
#Red_Team
These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming
https://github.com/sho-luv/chatgpt_created_tools
@BlueRedTeam
These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming
https://github.com/sho-luv/chatgpt_created_tools
@BlueRedTeam
GitHub
GitHub - sho-luv/gpt_tools: These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming
These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming - sho-luv/gpt_tools
👍1
#CVE-2023
CVE-2023-0669 Encrpytion helper
https://github.com/yosef0x01/CVE-2023-0669
Poc for CVE-2023-23752 (joomla CMS)
https://github.com/WhiteOwl-Pub/CVE-2023-23752
@BlueRedTeam
CVE-2023-0669 Encrpytion helper
https://github.com/yosef0x01/CVE-2023-0669
Poc for CVE-2023-23752 (joomla CMS)
https://github.com/WhiteOwl-Pub/CVE-2023-23752
@BlueRedTeam
#webshell
php webshell
https://github.com/n01ep3rz/upsilon-shell
webshell
https://github.com/cannibal-hannibal/Tess
A secure webshell
https://github.com/mickael-kerjean/webpty
@BlueRedTeam
php webshell
https://github.com/n01ep3rz/upsilon-shell
webshell
https://github.com/cannibal-hannibal/Tess
A secure webshell
https://github.com/mickael-kerjean/webpty
@BlueRedTeam
❤1👍1
#Red_Team
Red team penetration testing, intranet asset detection, general vulnerability scanning, weak password blasting, port forwarding, intranet penetration, SOCK5
https://github.com/rustgopy/RGPScan
@BlueRedTeam
Red team penetration testing, intranet asset detection, general vulnerability scanning, weak password blasting, port forwarding, intranet penetration, SOCK5
https://github.com/rustgopy/RGPScan
@BlueRedTeam
GitHub
GitHub - rustgopy/RGPScan: 红队渗透测试、内网资产探测、通用漏洞扫描、弱口令爆破
红队渗透测试、内网资产探测、通用漏洞扫描、弱口令爆破. Contribute to rustgopy/RGPScan development by creating an account on GitHub.
#webshell
A Python noscript that connects to a webshell to create a sudo-interactive terminal session.
https://github.com/malwaredetective/pyshell
php webshell
https://github.com/devilbhai/webshell
@BlueRedTeam
A Python noscript that connects to a webshell to create a sudo-interactive terminal session.
https://github.com/malwaredetective/pyshell
php webshell
https://github.com/devilbhai/webshell
@BlueRedTeam
GitHub
GitHub - malwaredetective/pyshell: A Python noscript that connects to a webshell to create a sudo-interactive terminal session.
A Python noscript that connects to a webshell to create a sudo-interactive terminal session. - malwaredetective/pyshell
#Red_Team
Materials for the workshop \"Red Team Ops: Havoc 101\"
https://github.com/WesleyWong420/RedTeamOps-Havoc-101
@BlueRedTeam
Materials for the workshop \"Red Team Ops: Havoc 101\"
https://github.com/WesleyWong420/RedTeamOps-Havoc-101
@BlueRedTeam
GitHub
GitHub - WesleyWong420/RedTeamOps-Havoc-101: Materials for the workshop "Red Team Ops: Havoc 101"
Materials for the workshop "Red Team Ops: Havoc 101" - WesleyWong420/RedTeamOps-Havoc-101
#Cobalt_Strike
Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature
https://github.com/Mav3rick33/ZenLdr
@BlueRedTeam
Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature
https://github.com/Mav3rick33/ZenLdr
@BlueRedTeam
GitHub
GitHub - Mav3rick33/ZenLdr: Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature
Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature - Mav3rick33/ZenLdr
👍1