Red Blue Team – Telegram
Red Blue Team
5.02K subscribers
38 photos
5 videos
33 files
1.43K links
-> 20 June 2019

]-> RedTeam | BlueTeam | Pentest

[-> Blue Team @BlueTeamKit
Download Telegram
Red Blue Team
#Cobalt_Strike Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer https://github.com/Hagrid29/BOF-RemoteRegSave @BlueRedTeam
BOF-RemoteRegSave-main.rar
15.4 KB
BOF - RemoteRegSave

A fork of RegSave BOF. Dump SAM/SYSTEM/SECURITY registry key hives on local or remote computer using RegConnectRegistryA and RegOpenKeyExA for offline parsing and hash extraction.

Usage

Dump registry key hives on local computer (admin elevation required)

RegSave --path [file path <optional>]

Dump registry key hives on remote computer (automatically enable service RemoteRegistry if disabled)

RegSave --pc remotePC --path [file path <optional>]
shell copy \\remoteSrv\C$\Windows\temp\HG029* .

Compile

cd SOURCE
make

@BlueRedTeam
1👍1🔥1
#Red_Team

​​A Red-Teamer diaries

RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.

https://github.com/ihebski/A-Red-Teamer-diaries

@BlueRedTeam
#Red_Team

A very basic, single-file, #PHPshell. It can be used to quickly execute commands on a server when pentesting a PHP application. Use it with caution: this noscript represents a security risk for the server.

https://github.com/flozz/p0wny-shell

@BlueRedTeam
CSharp Alternative Shellcode Callbacks

Alternative #shellcode execution techniques using Windows callback functions

Each CSharp file contains code to execute shellcode using native Windows callbacks. I tried to use much less common callback techniques that weren't typically documented online as far as I could tell. This way they should be more evasive.

https://github.com/wsummerhill/CSharp-Alt-Shellcode-Callbacks
@BlueTeamkit
@BlueRedTeam
#Red_Team

​​List of Awesome macOS Red Teaming Resources.

As more and more companies begin to adopt macOS as a daily office solution, we often encounter macOS operating system during our Pentest/Red Teaming process.

How to #hacking #macOS, how to achieve Persistence under macOS, and using this as a starting point Lateral Movement to DC is a topic worth research.

This list is for anyone who wants to learn about Red Teaming for macOS but has no starting point.

https://github.com/tonghuaroot/Awesome-macOS-Red-Teaming

@BlueRedTeam
1
Code snippets to add on top of #Cobalt_Strike sleep mask to achieve patchless hook on AMSI and ETW.

Feature:
→ Breakpoint will be removed during sleep to avoid scanner (I hope lol)
→ Avoid scanner like moneta that will detect if DLL is modified.

Usage :

1. Include "patchless.c" in sleepmask.c (only supports x64)

2.Add the functions required to do patchless hook on desired functions

→ You may refer to sleepmask.c to see what have been amended

3.Put patchless.c in src47 folder

4.Compile

https://github.com/ScriptIdiot/sleepmask_PatchlessHook

@BlueRedTeam
👍2