Red Blue Team – Telegram
Red Blue Team
5.02K subscribers
38 photos
5 videos
33 files
1.43K links
-> 20 June 2019

]-> RedTeam | BlueTeam | Pentest

[-> Blue Team @BlueTeamKit
Download Telegram
#Red_Team

Recon noscripts for Red Team and Web blackbox auditing

https://github.com/mtimani/Recon_noscripts

@BlueRedTeam
👍1
#Cobalt_Strike

It's just un implementation of in-house CoffLoader supporting #CobaltStrike standard BOF and BSS initialized variables.

Look at the main.c file to change the BOF and its parameters. CobalStrike handles the BOF parameter in a special way, the Arg structure is here to pass parameters easier.

https://github.com/OtterHacker/CoffLoader

@BlueRedTeam
​​Python parser for #Cobalt_Strike stagers

Use parse_stager_config.py to search a file for Cobalt Strike stager shellcode. If shellcode is found, it will be extracted in JSON format.

https://github.com/stairwell-inc/cobalt-strike-stager-parser

@BlueRedTeam
👍1
#Red_Team

Collection of tooling to use on Red Team engagements.

https://github.com/burnbrian/redteam-tooling

A curated list of Cybersecurity tools for Penetration Testing or Red Teaming.

https://github.com/q0phi80/CybersecurityTools

Eden Red Teaming

https://github.com/Eden-Advisory/altakahun

@BlueRedTeam
#Cobalt_Strike

All in 1 repo for anything and everything I work with that is Cobalt Strike related.

https://github.com/Altoid0/CobaltStrike-Library

@BlueRedTeam
👍1
#Red_Team

Collection of tooling to use on Red Team engagements.

https://github.com/burnbrian/redteam-utilities

@BlueRedTeam
#C2 #Cobalt_Strike

A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions.

C2 Feature:
▫️ Persistence (type persist)
▫️ Shell Access
▫️ System Info (type info)
▫️ More Features Will Be Added

Features:
▫️ FUD Ratio 0/40
▫️ Bypass Any EDR's Solutions
▫️ Bypass Any Network Restrictions
▫️ Commands Are Being Sent in Base64 And Decoded on server side
▫️ No More Tcp Shits

https://github.com/machine1337/gmailc2

@BlueRedTeam
#Red_Team

Inline-Execute-PE is a suite of Beacon Object Files (BOF's) and an accompanying Aggressor noscript for #Cobalt_Strike that enables Operators to load unmanaged Windows executables into Beacon memory and execute them, retrieving the output and rendering it in the Beacon console.

https://github.com/Octoberfest7/Inline-Execute-PE

@BlueRedTeam
#Red_Team

NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing RWX to X or RX or (both) [Bypassing AVs].

https://github.com/DamonMohammadbagher/NativePayload_PE1

@BlueRedTeam
#Red_Team

This tool is used for backdoor and shellcode generation for various architecture devices.

https://github.com/doudoudedi/hackEmbedded

@BlueRedTeam
👎1
#Red_Team

The shortest payload for a tiny php reverse shell written in 19 bytes using only non-alphanumeric characters. Hex values inside indicate raw bytes.

This will help to bypass WAF and execute PHP reverse shell for RCE.

https://gist.github.com/0xSojalSec/5bee09c7035985ddc13fddb16f191075

@BlueRedTeam
#​​Cobalt_Strike Beacon Notifier

A #?Cobalt Strike Beacon Notifier Via #Telegram #Bot.

Features:
▫️ Showing the Name of the Current User
▫️ Showing the Computer Name of the Current User
▫️ Showing the Type and Version of the Operating System
▫️ Showing the Type of the Process Exec Name
▫️ Showing the Internal IP of the System
▫️ Showing the Enternal IP of the System

https://github.com/lynxbinz/CS-Beacon-Notifier

@BlueRedTeam
👍1👎1
#Red_Team

Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll, and trigger exported APIs from the export table.

https://github.com/TheD1rkMtr/NTDLLReflection

@BlueRedTeam