Red Blue Team pinned «This channel is only about Red Team. Follow the contents of Blue Team from this @BlueTeamKit channel.»
Forwarded from Open Source intelligence [ OSINT ]
Beginners Field Guide: Where & How to Learn OSINT
This is not a comprehensive collection of resources. This collection is based on my own time spent on open-source intelligence. There are a million links with OSINT tools that can get the job done but this post is curated to point you in the right direction to obtain the necessary skills and mindset to get the job done. — EXTRA SECTION — FRAMEWORK FOR BEGINNERS
https://medium.com/the-sleuth-sheet/beginners-field-guide-where-how-to-learn-osint-bd2e11469f31
@OsintBlackBox
This is not a comprehensive collection of resources. This collection is based on my own time spent on open-source intelligence. There are a million links with OSINT tools that can get the job done but this post is curated to point you in the right direction to obtain the necessary skills and mindset to get the job done. — EXTRA SECTION — FRAMEWORK FOR BEGINNERS
https://medium.com/the-sleuth-sheet/beginners-field-guide-where-how-to-learn-osint-bd2e11469f31
@OsintBlackBox
Medium
Beginners Field Guide: Where & How to Learn OSINT
Discover, Uncover, Analyze: Master OSINT, Empower Intelligence Skills.
#Red_Team
These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming
https://github.com/sho-luv/chatgpt_created_tools
@BlueRedTeam
These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming
https://github.com/sho-luv/chatgpt_created_tools
@BlueRedTeam
GitHub
GitHub - sho-luv/gpt_tools: These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming
These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming - sho-luv/gpt_tools
👍1
#CVE-2023
CVE-2023-0669 Encrpytion helper
https://github.com/yosef0x01/CVE-2023-0669
Poc for CVE-2023-23752 (joomla CMS)
https://github.com/WhiteOwl-Pub/CVE-2023-23752
@BlueRedTeam
CVE-2023-0669 Encrpytion helper
https://github.com/yosef0x01/CVE-2023-0669
Poc for CVE-2023-23752 (joomla CMS)
https://github.com/WhiteOwl-Pub/CVE-2023-23752
@BlueRedTeam
#webshell
php webshell
https://github.com/n01ep3rz/upsilon-shell
webshell
https://github.com/cannibal-hannibal/Tess
A secure webshell
https://github.com/mickael-kerjean/webpty
@BlueRedTeam
php webshell
https://github.com/n01ep3rz/upsilon-shell
webshell
https://github.com/cannibal-hannibal/Tess
A secure webshell
https://github.com/mickael-kerjean/webpty
@BlueRedTeam
❤1👍1
#Red_Team
Red team penetration testing, intranet asset detection, general vulnerability scanning, weak password blasting, port forwarding, intranet penetration, SOCK5
https://github.com/rustgopy/RGPScan
@BlueRedTeam
Red team penetration testing, intranet asset detection, general vulnerability scanning, weak password blasting, port forwarding, intranet penetration, SOCK5
https://github.com/rustgopy/RGPScan
@BlueRedTeam
GitHub
GitHub - rustgopy/RGPScan: 红队渗透测试、内网资产探测、通用漏洞扫描、弱口令爆破
红队渗透测试、内网资产探测、通用漏洞扫描、弱口令爆破. Contribute to rustgopy/RGPScan development by creating an account on GitHub.
#webshell
A Python noscript that connects to a webshell to create a sudo-interactive terminal session.
https://github.com/malwaredetective/pyshell
php webshell
https://github.com/devilbhai/webshell
@BlueRedTeam
A Python noscript that connects to a webshell to create a sudo-interactive terminal session.
https://github.com/malwaredetective/pyshell
php webshell
https://github.com/devilbhai/webshell
@BlueRedTeam
GitHub
GitHub - malwaredetective/pyshell: A Python noscript that connects to a webshell to create a sudo-interactive terminal session.
A Python noscript that connects to a webshell to create a sudo-interactive terminal session. - malwaredetective/pyshell
#Red_Team
Materials for the workshop \"Red Team Ops: Havoc 101\"
https://github.com/WesleyWong420/RedTeamOps-Havoc-101
@BlueRedTeam
Materials for the workshop \"Red Team Ops: Havoc 101\"
https://github.com/WesleyWong420/RedTeamOps-Havoc-101
@BlueRedTeam
GitHub
GitHub - WesleyWong420/RedTeamOps-Havoc-101: Materials for the workshop "Red Team Ops: Havoc 101"
Materials for the workshop "Red Team Ops: Havoc 101" - WesleyWong420/RedTeamOps-Havoc-101
#Cobalt_Strike
Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature
https://github.com/Mav3rick33/ZenLdr
@BlueRedTeam
Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature
https://github.com/Mav3rick33/ZenLdr
@BlueRedTeam
GitHub
GitHub - Mav3rick33/ZenLdr: Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature
Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature - Mav3rick33/ZenLdr
👍1
#Red_Team
Recon noscripts for Red Team and Web blackbox auditing
https://github.com/mtimani/Recon_noscripts
@BlueRedTeam
Recon noscripts for Red Team and Web blackbox auditing
https://github.com/mtimani/Recon_noscripts
@BlueRedTeam
👍1
#Cobalt_Strike
It's just un implementation of in-house CoffLoader supporting #CobaltStrike standard BOF and BSS initialized variables.
Look at the main.c file to change the BOF and its parameters. CobalStrike handles the BOF parameter in a special way, the Arg structure is here to pass parameters easier.
https://github.com/OtterHacker/CoffLoader
@BlueRedTeam
It's just un implementation of in-house CoffLoader supporting #CobaltStrike standard BOF and BSS initialized variables.
Look at the main.c file to change the BOF and its parameters. CobalStrike handles the BOF parameter in a special way, the Arg structure is here to pass parameters easier.
https://github.com/OtterHacker/CoffLoader
@BlueRedTeam
GitHub
GitHub - OtterHacker/CoffLoader
Contribute to OtterHacker/CoffLoader development by creating an account on GitHub.
Python parser for #Cobalt_Strike stagers
Use parse_stager_config.py to search a file for Cobalt Strike stager shellcode. If shellcode is found, it will be extracted in JSON format.
https://github.com/stairwell-inc/cobalt-strike-stager-parser
@BlueRedTeam
Use parse_stager_config.py to search a file for Cobalt Strike stager shellcode. If shellcode is found, it will be extracted in JSON format.
https://github.com/stairwell-inc/cobalt-strike-stager-parser
@BlueRedTeam
GitHub
GitHub - stairwell-inc/cobalt-strike-stager-parser
Contribute to stairwell-inc/cobalt-strike-stager-parser development by creating an account on GitHub.
👍1
#Red_Team
Collection of tooling to use on Red Team engagements.
https://github.com/burnbrian/redteam-tooling
A curated list of Cybersecurity tools for Penetration Testing or Red Teaming.
https://github.com/q0phi80/CybersecurityTools
Eden Red Teaming
https://github.com/Eden-Advisory/altakahun
@BlueRedTeam
Collection of tooling to use on Red Team engagements.
https://github.com/burnbrian/redteam-tooling
A curated list of Cybersecurity tools for Penetration Testing or Red Teaming.
https://github.com/q0phi80/CybersecurityTools
Eden Red Teaming
https://github.com/Eden-Advisory/altakahun
@BlueRedTeam
#Cobalt_Strike
All in 1 repo for anything and everything I work with that is Cobalt Strike related.
https://github.com/Altoid0/CobaltStrike-Library
@BlueRedTeam
All in 1 repo for anything and everything I work with that is Cobalt Strike related.
https://github.com/Altoid0/CobaltStrike-Library
@BlueRedTeam
👍1
#Red_Team
Collection of tooling to use on Red Team engagements.
https://github.com/burnbrian/redteam-utilities
@BlueRedTeam
Collection of tooling to use on Red Team engagements.
https://github.com/burnbrian/redteam-utilities
@BlueRedTeam