ابزار Powershell برای خودکار کردن شمارش اکتیو دایرکتوری
https://github.com/61106960/adPEAS#simple-usage-with-generic-program-parameters
#PowerShell
#RedTeam
#AD
@NetPentester
https://github.com/61106960/adPEAS#simple-usage-with-generic-program-parameters
#PowerShell
#RedTeam
#AD
@NetPentester
GitHub
GitHub - 61106960/adPEAS: Powershell tool to automate Active Directory enumeration.
Powershell tool to automate Active Directory enumeration. - 61106960/adPEAS
هانی پات شبکه داخلی برای تشخیص اینکه آیا یک تهدید مهاجم/داخلی شبکه شما را برای log4j CVE-2021-44228 اسکن می کند.
https://github.com/BinaryDefense/log4j-honeypot-flask
#honeypot
#Log4j
@NetPentester
https://github.com/BinaryDefense/log4j-honeypot-flask
#honeypot
#Log4j
@NetPentester
نقشه ذهنی برای سرویس ها AWS
برای دریافت آسانتر گواهینامه های AWS
https://github.com/notcuder/aws-mindmap
#Mindmap
#Aws
@NetPentester
برای دریافت آسانتر گواهینامه های AWS
https://github.com/notcuder/aws-mindmap
#Mindmap
#Aws
@NetPentester
GitHub
GitHub - notcuder/aws-mindmap: The mindmaps for AWS services to get AWS Certificates easier.
The mindmaps for AWS services to get AWS Certificates easier. - notcuder/aws-mindmap
CrackMapExec (CME)
یک ابزار پس از بهره برداری است که به ارزیابی خودکار امنیت شبکه های بزرگ Active Directory کمک می کند.
https://github.com/byt3bl33d3r/CrackMapExec
#AD
#CME
@NetPentester
یک ابزار پس از بهره برداری است که به ارزیابی خودکار امنیت شبکه های بزرگ Active Directory کمک می کند.
https://github.com/byt3bl33d3r/CrackMapExec
#AD
#CME
@NetPentester
GitHub
GitHub - byt3bl33d3r/CrackMapExec: A swiss army knife for pentesting networks
A swiss army knife for pentesting networks. Contribute to byt3bl33d3r/CrackMapExec development by creating an account on GitHub.
CVE-2021-45608 - NetUSB RCE Flaw in Millions of End User Routers
https://www.sentinelone.com/labs/cve-2021-45608-netusb-rce-flaw-in-millions-of-end-user-routers
#router
#cve
@NetPentester
https://www.sentinelone.com/labs/cve-2021-45608-netusb-rce-flaw-in-millions-of-end-user-routers
#router
#cve
@NetPentester
SentinelOne
CVE-2021-45608 | NetUSB RCE Flaw in Millions of End User Routers
SentinelLabs has discovered a high severity flaw in NetUSB which could be remotely exploited to execute code in the kernel.
icmpdoor
شل معکوس ICMP در پایتون 3
https://cryptsus.com/blog/icmp-reverse-shell.html
https://github.com/krabelize/icmpdoor
#python
@NetPentester
شل معکوس ICMP در پایتون 3
https://cryptsus.com/blog/icmp-reverse-shell.html
https://github.com/krabelize/icmpdoor
#python
@NetPentester
Cryptsus
icmpdoor - ICMP reverse shell in Python 3 — Cryptsus Blog
Cryptsus is a security consulting group of expert hackers specializing in securing systems and networks, authentication systems and vulnerability management.
Searching for Deserialization Protection Bypasses
in Microsoft Exchange (CVE-2022-21969)
https://medium.com/@frycos/searching-for-deserialization-protection-bypasses-in-microsoft-exchange-cve-2022-21969-bfa38f63a62d
#Microsoft
#exchange
@NetPentester
in Microsoft Exchange (CVE-2022-21969)
https://medium.com/@frycos/searching-for-deserialization-protection-bypasses-in-microsoft-exchange-cve-2022-21969-bfa38f63a62d
#Microsoft
#exchange
@NetPentester
Medium
Searching for Deserialization Protection Bypasses in Microsoft Exchange (CVE-2022–21969)
This story begins with a series of fails, but why? That is because of my special relationship with the Microsoft Exchange codebase…
SMBploit
- ابزار تهاجمی برای اسکن/سوء استفاده از آسیبپذیریها در ویندوز مایکروسافت از طریق پروتکل Samba (SMB) با استفاده از چارچوب Metasploit
https://github.com/d4t4s3c/SMBploit
@NetPentester
- ابزار تهاجمی برای اسکن/سوء استفاده از آسیبپذیریها در ویندوز مایکروسافت از طریق پروتکل Samba (SMB) با استفاده از چارچوب Metasploit
https://github.com/d4t4s3c/SMBploit
@NetPentester
عملکرد آسیب پذیری AWS Lambda - دسترسی اولیه در حملات ابری
https://sysdig.com/blog/exploit-mitigate-aws-lambdas-mitre
#Cloud
#Vulnerability
#Privilege
@NetPentester
https://sysdig.com/blog/exploit-mitigate-aws-lambdas-mitre
#Cloud
#Vulnerability
#Privilege
@NetPentester
Sysdig
Lambda Threat – Best Practices for Lambda Security | Sysdig
The security research team explains the attack scenario with a vulnerable AWS Lambda function could be a threat used by attackers.
بهره برداری از پیکربندی های اشتباه رایج در سیستم های تلفن سیسکو
https://www.trustedsec.com/blog/seeyoucm-thief-exploiting-common-misconfigurations-in-cisco-phone-systems
]-> ابزاری برای دانلود/تجزیه خودکار فایل های پیکربندی از سیستم های تلفن سیسکو در جستجوی اعتبارنامه SSH:
https://github.com/trustedsec/SeeYouCM-Thief
#Cisco
#Tools
@NetPentester
https://www.trustedsec.com/blog/seeyoucm-thief-exploiting-common-misconfigurations-in-cisco-phone-systems
]-> ابزاری برای دانلود/تجزیه خودکار فایل های پیکربندی از سیستم های تلفن سیسکو در جستجوی اعتبارنامه SSH:
https://github.com/trustedsec/SeeYouCM-Thief
#Cisco
#Tools
@NetPentester
TrustedSec
SeeYouCM-Thief: Exploiting Common Misconfigurations in Cisco Phone…
1.1 Intro I spent my early IT career working for a Cisco partner that specialized in Cisco phone systems. I did, however, get to see my share of networks…
Attack and defend active directory using modern
post exploitation adversary tradecraft activity
https://github.com/infosecn1nja/AD-Attack-Defense
#AD
#RedTeam
#Attack
@NetPentester
post exploitation adversary tradecraft activity
https://github.com/infosecn1nja/AD-Attack-Defense
#AD
#RedTeam
#Attack
@NetPentester
GitHub
GitHub - infosecn1nja/AD-Attack-Defense: Attack and defend active directory using modern post exploitation adversary tradecraft…
Attack and defend active directory using modern post exploitation adversary tradecraft activity - infosecn1nja/AD-Attack-Defense
Mandiant Azure AD Investigator:
PowerShell module for detecting artifacts that may be indicators of UNC2452 and other threat actor activity
https://github.com/mandiant/Mandiant-Azure-AD-Investigator
#Cloud
#AD
#Azure
#PowerShell
@NetPentester
PowerShell module for detecting artifacts that may be indicators of UNC2452 and other threat actor activity
https://github.com/mandiant/Mandiant-Azure-AD-Investigator
#Cloud
#AD
#Azure
#PowerShell
@NetPentester
GitHub
GitHub - mandiant/Mandiant-Azure-AD-Investigator
Contribute to mandiant/Mandiant-Azure-AD-Investigator development by creating an account on GitHub.
منابع و یادداشت های امنیتی Azure
https://github.com/rootsecdev/Azure-Red-Team
#Cloud
#Azure
#RedTeam
@NetPentester
https://github.com/rootsecdev/Azure-Red-Team
#Cloud
#Azure
#RedTeam
@NetPentester
GitHub
GitHub - rootsecdev/Azure-Red-Team: Azure Security Resources and Notes
Azure Security Resources and Notes. Contribute to rootsecdev/Azure-Red-Team development by creating an account on GitHub.
بررسی امنیتی Active Directory در چند ثانیه ابزار PingCastle به شما امکان می دهد تا بیش از 100 هزار بررسی امنیتی را بدون نصب، مدیریت یا ارسال داده "به ابر" انجام دهید، در حالی که یک گزارش راحت تولید می کنید. برخی از بررسی ها شامل خطرات بالقوه است، بنابراین ممکن است گاه به گاه نتایج مثبت کاذب وجود داشته باشد.
https://github.com/vletoux/pingcastle
#RedTeam
#AD
@NetPentester
https://github.com/vletoux/pingcastle
#RedTeam
#AD
@NetPentester
GitHub
GitHub - netwrix/pingcastle: PingCastle - Get Active Directory Security at 80% in 20% of the time
PingCastle - Get Active Directory Security at 80% in 20% of the time - netwrix/pingcastle
Identify privilege escalation paths within and across different clouds/SaaS
https://github.com/carlospolop/PurplePanda
#tools
#Cloud
#Privilege
@NetPentester
https://github.com/carlospolop/PurplePanda
#tools
#Cloud
#Privilege
@NetPentester
GitHub
GitHub - carlospolop/PurplePanda: Identify privilege escalation paths within and across different clouds
Identify privilege escalation paths within and across different clouds - carlospolop/PurplePanda
Persistence with Azure Policy Guest Configuration
https://cloudbrothers.info/en/azure-persistence-azure-policy-guest-configuration
#Cloud
#Azure
@NetPentester
https://cloudbrothers.info/en/azure-persistence-azure-policy-guest-configuration
#Cloud
#Azure
@NetPentester
cloudbrothers.info
Persistence with Azure Policy Guest Configuration
Azure Policy enables administrators to define, enforce and remediate configuration standards on Azure resources and even on non Azure assets using Azure Arc. One key feature, that was released in 2021, is the guest configuration feature of Azure Policy.
Basically…
Basically…
RDWArecon
یک اسکریپت پایتون برای استخراج اطلاعات از یک برنامه Microsoft Remote Desktop Web Access (RDWA)
#Microsoft
#python
https://github.com/p0dalirius/RDWArecon
@NetPentester
یک اسکریپت پایتون برای استخراج اطلاعات از یک برنامه Microsoft Remote Desktop Web Access (RDWA)
#Microsoft
#python
https://github.com/p0dalirius/RDWArecon
@NetPentester
GitHub
GitHub - p0dalirius/RDWAtool: A python noscript to extract information from a Microsoft Remote Desktop Web Access (RDWA) application
A python noscript to extract information from a Microsoft Remote Desktop Web Access (RDWA) application - GitHub - p0dalirius/RDWAtool: A python noscript to extract information from a Microsoft Remote ...
MITRE Cyber Analytics Repository (CAR)
https://car.mitre.org
]-> https://github.com/mitre-attack/car
#Mitre
@NetPentester
https://car.mitre.org
]-> https://github.com/mitre-attack/car
#Mitre
@NetPentester
MITRE Cyber Analytics Repository
Welcome to the Cyber Analytics Repository
Cisco RV340 SSL VPN RCE
بدون احراز هویت به عنوان ریشه
https://github.com/rdomanski/Exploits_and_Advisories/blob/master/advisories/Pwn2Own/Austin2021/flashback_connects/flashback_connects.md
#exploit
#Cisco
@NetPentester
بدون احراز هویت به عنوان ریشه
https://github.com/rdomanski/Exploits_and_Advisories/blob/master/advisories/Pwn2Own/Austin2021/flashback_connects/flashback_connects.md
#exploit
#Cisco
@NetPentester