Red Blue Team – Telegram
Red Blue Team
5.02K subscribers
38 photos
5 videos
33 files
1.43K links
-> 20 June 2019

]-> RedTeam | BlueTeam | Pentest

[-> Blue Team @BlueTeamKit
Download Telegram
#Red_Team

Collection of tooling to use on Red Team engagements.

https://github.com/burnbrian/redteam-tooling

A curated list of Cybersecurity tools for Penetration Testing or Red Teaming.

https://github.com/q0phi80/CybersecurityTools

Eden Red Teaming

https://github.com/Eden-Advisory/altakahun

@BlueRedTeam
#Cobalt_Strike

All in 1 repo for anything and everything I work with that is Cobalt Strike related.

https://github.com/Altoid0/CobaltStrike-Library

@BlueRedTeam
👍1
#Red_Team

Collection of tooling to use on Red Team engagements.

https://github.com/burnbrian/redteam-utilities

@BlueRedTeam
#C2 #Cobalt_Strike

A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions.

C2 Feature:
▫️ Persistence (type persist)
▫️ Shell Access
▫️ System Info (type info)
▫️ More Features Will Be Added

Features:
▫️ FUD Ratio 0/40
▫️ Bypass Any EDR's Solutions
▫️ Bypass Any Network Restrictions
▫️ Commands Are Being Sent in Base64 And Decoded on server side
▫️ No More Tcp Shits

https://github.com/machine1337/gmailc2

@BlueRedTeam
#Red_Team

Inline-Execute-PE is a suite of Beacon Object Files (BOF's) and an accompanying Aggressor noscript for #Cobalt_Strike that enables Operators to load unmanaged Windows executables into Beacon memory and execute them, retrieving the output and rendering it in the Beacon console.

https://github.com/Octoberfest7/Inline-Execute-PE

@BlueRedTeam
#Red_Team

NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing RWX to X or RX or (both) [Bypassing AVs].

https://github.com/DamonMohammadbagher/NativePayload_PE1

@BlueRedTeam
#Red_Team

This tool is used for backdoor and shellcode generation for various architecture devices.

https://github.com/doudoudedi/hackEmbedded

@BlueRedTeam
👎1
#Red_Team

The shortest payload for a tiny php reverse shell written in 19 bytes using only non-alphanumeric characters. Hex values inside indicate raw bytes.

This will help to bypass WAF and execute PHP reverse shell for RCE.

https://gist.github.com/0xSojalSec/5bee09c7035985ddc13fddb16f191075

@BlueRedTeam
#​​Cobalt_Strike Beacon Notifier

A #?Cobalt Strike Beacon Notifier Via #Telegram #Bot.

Features:
▫️ Showing the Name of the Current User
▫️ Showing the Computer Name of the Current User
▫️ Showing the Type and Version of the Operating System
▫️ Showing the Type of the Process Exec Name
▫️ Showing the Internal IP of the System
▫️ Showing the Enternal IP of the System

https://github.com/lynxbinz/CS-Beacon-Notifier

@BlueRedTeam
👍1👎1
#Red_Team

Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll, and trigger exported APIs from the export table.

https://github.com/TheD1rkMtr/NTDLLReflection

@BlueRedTeam
#Red_Team

​​Red_Team_Code_Snippets

A disorganized repository of code snippets that I have found useful in getting the hang of new languages in the context of Red Team operations.

Some of this code will be referenced in other products and is retained here for ease of access.

https://github.com/0xTriboulet/Red_Team_Code_Snippets

@BlueRedTeam
For Advertising And Contact
@NetPwn
برای تبلیغات و تبادل و ارتباط
@netpwn
👎51
#Cobalt_Strike

This is a new light-weight, first-stage C2 implant written in Nim, with a supporting Python server and Next.JS web GUI.

https://github.com/chvancooten/NimPlant

@BlueRedTeam