#Cobalt_Strike
amd ryzen driver exploit
Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).
https://github.com/tijme/amd-ryzen-master-driver-v17-exploit
@BlueRedTeam
amd ryzen driver exploit
Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).
https://github.com/tijme/amd-ryzen-master-driver-v17-exploit
@BlueRedTeam
GitHub
GitHub - tijme/amd-ryzen-master-driver-v17-exploit: Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's…
Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17). - tijme/amd-ryzen-master-driver-v17-exploit
#Red_Team
Inline-Execute-PE is a suite of Beacon Object Files (BOF's) and an accompanying Aggressor noscript for #Cobalt_Strike that enables Operators to load unmanaged Windows executables into Beacon memory and execute them, retrieving the output and rendering it in the Beacon console.
https://github.com/Octoberfest7/Inline-Execute-PE
@BlueRedTeam
Inline-Execute-PE is a suite of Beacon Object Files (BOF's) and an accompanying Aggressor noscript for #Cobalt_Strike that enables Operators to load unmanaged Windows executables into Beacon memory and execute them, retrieving the output and rendering it in the Beacon console.
https://github.com/Octoberfest7/Inline-Execute-PE
@BlueRedTeam
GitHub
GitHub - Octoberfest7/Inline-Execute-PE: Execute unmanaged Windows executables in CobaltStrike Beacons
Execute unmanaged Windows executables in CobaltStrike Beacons - GitHub - Octoberfest7/Inline-Execute-PE: Execute unmanaged Windows executables in CobaltStrike Beacons
#Red_Team
NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing RWX to X or RX or (both) [Bypassing AVs].
https://github.com/DamonMohammadbagher/NativePayload_PE1
@BlueRedTeam
NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing RWX to X or RX or (both) [Bypassing AVs].
https://github.com/DamonMohammadbagher/NativePayload_PE1
@BlueRedTeam
#Red_Team
This tool is used for backdoor and shellcode generation for various architecture devices.
https://github.com/doudoudedi/hackEmbedded
@BlueRedTeam
This tool is used for backdoor and shellcode generation for various architecture devices.
https://github.com/doudoudedi/hackEmbedded
@BlueRedTeam
👎1
#Red_Team
The shortest payload for a tiny php reverse shell written in 19 bytes using only non-alphanumeric characters. Hex values inside indicate raw bytes.
This will help to bypass WAF and execute PHP reverse shell for RCE.
https://gist.github.com/0xSojalSec/5bee09c7035985ddc13fddb16f191075
@BlueRedTeam
The shortest payload for a tiny php reverse shell written in 19 bytes using only non-alphanumeric characters. Hex values inside indicate raw bytes.
This will help to bypass WAF and execute PHP reverse shell for RCE.
https://gist.github.com/0xSojalSec/5bee09c7035985ddc13fddb16f191075
@BlueRedTeam
#Cobalt_Strike Beacon Notifier
A #?Cobalt Strike Beacon Notifier Via #Telegram #Bot.
Features:
▫️ Showing the Name of the Current User
▫️ Showing the Computer Name of the Current User
▫️ Showing the Type and Version of the Operating System
▫️ Showing the Type of the Process Exec Name
▫️ Showing the Internal IP of the System
▫️ Showing the Enternal IP of the System
https://github.com/lynxbinz/CS-Beacon-Notifier
@BlueRedTeam
A #?Cobalt Strike Beacon Notifier Via #Telegram #Bot.
Features:
▫️ Showing the Name of the Current User
▫️ Showing the Computer Name of the Current User
▫️ Showing the Type and Version of the Operating System
▫️ Showing the Type of the Process Exec Name
▫️ Showing the Internal IP of the System
▫️ Showing the Enternal IP of the System
https://github.com/lynxbinz/CS-Beacon-Notifier
@BlueRedTeam
👍1👎1
#Red_Team
Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll, and trigger exported APIs from the export table.
https://github.com/TheD1rkMtr/NTDLLReflection
@BlueRedTeam
Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll, and trigger exported APIs from the export table.
https://github.com/TheD1rkMtr/NTDLLReflection
@BlueRedTeam
#Red_Team
Red_Team_Code_Snippets
A disorganized repository of code snippets that I have found useful in getting the hang of new languages in the context of Red Team operations.
Some of this code will be referenced in other products and is retained here for ease of access.
https://github.com/0xTriboulet/Red_Team_Code_Snippets
@BlueRedTeam
Red_Team_Code_Snippets
A disorganized repository of code snippets that I have found useful in getting the hang of new languages in the context of Red Team operations.
Some of this code will be referenced in other products and is retained here for ease of access.
https://github.com/0xTriboulet/Red_Team_Code_Snippets
@BlueRedTeam
GitHub
GitHub - 0xTriboulet/Red_Team_Code_Snippets: random code snippets, useful for getting started
random code snippets, useful for getting started. Contribute to 0xTriboulet/Red_Team_Code_Snippets development by creating an account on GitHub.
#Cobalt_Strike
This repository contains a collection of tools that integrate with Cobalt Strike through Beacon Object Files (BOFs).
https://github.com/REDMED-X/OperatorsKit
@BlueRedTeam
This repository contains a collection of tools that integrate with Cobalt Strike through Beacon Object Files (BOFs).
https://github.com/REDMED-X/OperatorsKit
@BlueRedTeam
GitHub
GitHub - REDMED-X/OperatorsKit: Collection of Beacon Object Files (BOF) for Cobalt Strike
Collection of Beacon Object Files (BOF) for Cobalt Strike - REDMED-X/OperatorsKit
👎5❤1
#Cobalt_Strike
This is a new light-weight, first-stage C2 implant written in Nim, with a supporting Python server and Next.JS web GUI.
https://github.com/chvancooten/NimPlant
@BlueRedTeam
This is a new light-weight, first-stage C2 implant written in Nim, with a supporting Python server and Next.JS web GUI.
https://github.com/chvancooten/NimPlant
@BlueRedTeam
#Cobalt_Strike
Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray
https://github.com/Hagrid29/BOF-SprayAD
@BlueRedTeam
Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray
https://github.com/Hagrid29/BOF-SprayAD
@BlueRedTeam
GitHub
GitHub - Hagrid29/BOF-SprayAD: Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password…
Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray - Hagrid29/BOF-SprayAD
Red Blue Team
#Cobalt_Strike Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray https://github.com/Hagrid29/BOF-SprayAD @BlueRedTeam
BOF-SprayAD-main.rar
18 KB
BOF - DomainPasswordSpray
A fork of SprayAD BOF. Perform LDAP-based or Kerberos-based password spray using Windows API LogonUserSSPI. Skip disabled accounts, locked accounts and large BadPwdCount (if specified).
Usage
Kerberos-based password spray
A fork of SprayAD BOF. Perform LDAP-based or Kerberos-based password spray using Windows API LogonUserSSPI. Skip disabled accounts, locked accounts and large BadPwdCount (if specified).
Usage
Kerberos-based password spray
SprayAD --userlist /tmp/userlist.txt --password P@ssw0rdSkip users that the number of times the user tried to log on with incorrect password larger than 2
SprayAD --userlist /tmp/userlist.txt --password P@ssw0rd --MaxBadPwdCount 2LDAP-based password spray
SprayAD --userlist /tmp/userlist.txt --password P@ssw0rd --MaxBadPwdCount 2 --authservice ldapCompile
cd SOURCE@BlueRedTeam
make
👍1
#Cobalt_Strike
Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer
https://github.com/Hagrid29/BOF-RemoteRegSave
@BlueRedTeam
Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer
https://github.com/Hagrid29/BOF-RemoteRegSave
@BlueRedTeam
GitHub
GitHub - Hagrid29/BOF-RemoteRegSave: Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to…
Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer - Hagrid29/BOF-RemoteRegSave
Red Blue Team
#Cobalt_Strike Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer https://github.com/Hagrid29/BOF-RemoteRegSave @BlueRedTeam
BOF-RemoteRegSave-main.rar
15.4 KB
BOF - RemoteRegSave
A fork of RegSave BOF. Dump SAM/SYSTEM/SECURITY registry key hives on local or remote computer using RegConnectRegistryA and RegOpenKeyExA for offline parsing and hash extraction.
Usage
Dump registry key hives on local computer (admin elevation required)
A fork of RegSave BOF. Dump SAM/SYSTEM/SECURITY registry key hives on local or remote computer using RegConnectRegistryA and RegOpenKeyExA for offline parsing and hash extraction.
Usage
Dump registry key hives on local computer (admin elevation required)
RegSave --path [file path <optional>]Dump registry key hives on remote computer (automatically enable service RemoteRegistry if disabled)
RegSave --pc remotePC --path [file path <optional>]Compile
shell copy \\remoteSrv\C$\Windows\temp\HG029* .
cd SOURCE@BlueRedTeam
make
❤1👍1🔥1
#Red_Team
A Red-Teamer diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
https://github.com/ihebski/A-Red-Teamer-diaries
@BlueRedTeam
A Red-Teamer diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
https://github.com/ihebski/A-Red-Teamer-diaries
@BlueRedTeam
#Red_Team
A very basic, single-file, #PHPshell. It can be used to quickly execute commands on a server when pentesting a PHP application. Use it with caution: this noscript represents a security risk for the server.
https://github.com/flozz/p0wny-shell
@BlueRedTeam
A very basic, single-file, #PHPshell. It can be used to quickly execute commands on a server when pentesting a PHP application. Use it with caution: this noscript represents a security risk for the server.
https://github.com/flozz/p0wny-shell
@BlueRedTeam
CSharp Alternative Shellcode Callbacks
Alternative #shellcode execution techniques using Windows callback functions
Each CSharp file contains code to execute shellcode using native Windows callbacks. I tried to use much less common callback techniques that weren't typically documented online as far as I could tell. This way they should be more evasive.
https://github.com/wsummerhill/CSharp-Alt-Shellcode-Callbacks
@BlueTeamkit
@BlueRedTeam
Alternative #shellcode execution techniques using Windows callback functions
Each CSharp file contains code to execute shellcode using native Windows callbacks. I tried to use much less common callback techniques that weren't typically documented online as far as I could tell. This way they should be more evasive.
https://github.com/wsummerhill/CSharp-Alt-Shellcode-Callbacks
@BlueTeamkit
@BlueRedTeam
GitHub
GitHub - wsummerhill/CSharp-Alt-Shellcode-Callbacks: A collection of (even more) alternative shellcode callback methods in CSharp
A collection of (even more) alternative shellcode callback methods in CSharp - wsummerhill/CSharp-Alt-Shellcode-Callbacks
#shellcode
Shellcode loader, hooks detector and more written in Golang.
https://github.com/D3Ext/Hooka
@BlueRedTeam
Shellcode loader, hooks detector and more written in Golang.
https://github.com/D3Ext/Hooka
@BlueRedTeam
GitHub
GitHub - D3Ext/Hooka: Shellcode loader generator with multiples features
Shellcode loader generator with multiples features - D3Ext/Hooka
👍3