Red Blue Team
#Red_Team Automate recon for red team assessments. Thoth is a very modular tool that automates the execution of tools during a reconnaissance assessment. Using multithreading, several tools are executed simultaneously. The use of different modules can beβ¦
thoth-master.zip
567.4 KB
π2π1
#Red_Team
Some HTB, THM , Red Team Training writeups
https://github.com/opabravo/security-writeups
@BlueRedTeam
Some HTB, THM , Red Team Training writeups
https://github.com/opabravo/security-writeups
@BlueRedTeam
GitHub
GitHub - opabravo/security-writeups: Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups
Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups - opabravo/security-writeups
π1
#CVE-2023
A script to automate privilege escalation with CVE-2023-22809 vulnerability
https://github.com/n3m1dotsys/CVE-2023-22809-sudoedit-privesc
A script to automate privilege escalation with CVE-2023-22809 vulnerability
https://github.com/Live-Hack-CVE/CVE-2023-22884
POC and Scanner for CVE-2023-24055
https://github.com/Live-Hack-CVE/CVE-2023-21867
@BlueRedTeam
A script to automate privilege escalation with CVE-2023-22809 vulnerability
https://github.com/n3m1dotsys/CVE-2023-22809-sudoedit-privesc
A script to automate privilege escalation with CVE-2023-22809 vulnerability
https://github.com/Live-Hack-CVE/CVE-2023-22884
POC and Scanner for CVE-2023-24055
https://github.com/Live-Hack-CVE/CVE-2023-21867
@BlueRedTeam
GitHub
GitHub - n3m1sys/CVE-2023-22809-sudoedit-privesc: A script to automate privilege escalation with CVE-2023-22809 vulnerability
A script to automate privilege escalation with CVE-2023-22809 vulnerability - n3m1sys/CVE-2023-22809-sudoedit-privesc
π1π1
#webshell
Various webshells. We accept pull requests for additions to this collection.
https://github.com/BlackArch/webshells
@BlueRedTeam
Various webshells. We accept pull requests for additions to this collection.
https://github.com/BlackArch/webshells
@BlueRedTeam
GitHub
GitHub - BlackArch/webshells: Various webshells. We accept pull requests for additions to this collection.
Various webshells. We accept pull requests for additions to this collection. - BlackArch/webshells
#CVE-2023
POC and Scanner for CVE-2023-24055
https://github.com/deetl/CVE-2023-24055
CVE-2023-21839 exp
https://github.com/fakenews2025/CVE-2023-21839
CVE-2023-23132
https://github.com/l00neyhacker/CVE-2023-23132
@BlueRedTeam
POC and Scanner for CVE-2023-24055
https://github.com/deetl/CVE-2023-24055
CVE-2023-21839 exp
https://github.com/fakenews2025/CVE-2023-21839
CVE-2023-23132
https://github.com/l00neyhacker/CVE-2023-23132
@BlueRedTeam
GitHub
GitHub - deetl/CVE-2023-24055: POC and Scanner for CVE-2023-24055
POC and Scanner for CVE-2023-24055. Contribute to deetl/CVE-2023-24055 development by creating an account on GitHub.
π1
#Red_Team
Collection of OPSEC Tradecraft and TTPs for Red Team Operations
https://github.com/hack-with-ethics/dns-recon-dns-redTeaming
@BlueRedTeam
Collection of OPSEC Tradecraft and TTPs for Red Team Operations
https://github.com/hack-with-ethics/dns-recon-dns-redTeaming
@BlueRedTeam
GitHub
GitHub - hack-with-ethics/dns-recon-dns-redTeaming: This is a Python script that provides the ability to perform: Check all NSβ¦
This is a Python script that provides the ability to perform: Check all NS Records for Zone Transfers. Enumerate General DNS Records for a given Domain (MX, SOA, NS, A, AAAA, SPF and TXT). Perform ...
π1
How many stars do you give to our channel?
Anonymous Poll
10%
β
3%
ββ
10%
βββ
17%
ββββ
60%
βββββ
#Cobalt_Strike
Toolset for research malware and Cobalt Strike beacons
https://github.com/RomanEmelyanov/CobaltStrikeForensic
@BlueRedTeam
Toolset for research malware and Cobalt Strike beacons
https://github.com/RomanEmelyanov/CobaltStrikeForensic
@BlueRedTeam
GitHub
GitHub - RomanEmelyanov/CobaltStrikeForensic: Toolset for research malware and Cobalt Strike beacons
Toolset for research malware and Cobalt Strike beacons - RomanEmelyanov/CobaltStrikeForensic
π1
#CVE-2023
This is a proof of concept for CVE-2023-24610
https://github.com/abbisQQ/CVE-2023-24610
CVE-2023-23924 PoC
https://github.com/motikan2010/CVE-2023-23924
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-20916
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-22664
@BlueRedTeam
This is a proof of concept for CVE-2023-24610
https://github.com/abbisQQ/CVE-2023-24610
CVE-2023-23924 PoC
https://github.com/motikan2010/CVE-2023-23924
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-20916
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-22664
@BlueRedTeam
GitHub
GitHub - abbisQQ/CVE-2023-24610: This is a proof of concept for CVE-2023-24610
This is a proof of concept for CVE-2023-24610. Contribute to abbisQQ/CVE-2023-24610 development by creating an account on GitHub.
#Red_Team
This is a template to show how the Red Team will structure files
https://github.com/stevenshow/File-Structure
@BlueRedTeam
This is a template to show how the Red Team will structure files
https://github.com/stevenshow/File-Structure
@BlueRedTeam
GitHub
GitHub - stevenshow/File-Structure: This is a template to show how the Red Team will structure files
This is a template to show how the Red Team will structure files - stevenshow/File-Structure
#Red_Team
This is a template to show how the Red Team will structure files
https://github.com/halbeeb/Cloud-Warehouse-AWS-Redshift
@BlueRedTeam
This is a template to show how the Red Team will structure files
https://github.com/halbeeb/Cloud-Warehouse-AWS-Redshift
@BlueRedTeam
GitHub
GitHub - halbeeb/Cloud-Warehouse-AWS-Redshift: This project builds an ELT pipeline that extracts data from S3, stages them in Redshiftβ¦
This project builds an ELT pipeline that extracts data from S3, stages them in Redshift, and transforms data into a set of dimensional tables for Sparkify analytics team to continue finding insight...
π3
This channel is only about Red Team.
Follow the contents of Blue Team from this @BlueTeamKit channel.
Follow the contents of Blue Team from this @BlueTeamKit channel.
π7
#CVE-2023
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-20916
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-22664
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
https://github.com/hacksysteam/CVE-2023-21608
@BlueRedTeam
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-20916
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-22664
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
https://github.com/hacksysteam/CVE-2023-21608
@BlueRedTeam
GitHub
GitHub - hacksysteam/CVE-2023-21608: Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit - hacksysteam/CVE-2023-21608
π1
#CVE-2023
PowerShell POC for CVE-2023-24055
https://github.com/ATTACKnDEFEND/CVE-2023-24055
PowerShell POC for CVE-2023-24055
https://github.com/Live-Hack-CVE/CVE-2023-22458
@BlueRedTeam
PowerShell POC for CVE-2023-24055
https://github.com/ATTACKnDEFEND/CVE-2023-24055
PowerShell POC for CVE-2023-24055
https://github.com/Live-Hack-CVE/CVE-2023-22458
@BlueRedTeam
GitHub
GitHub - duckbillsecurity/CVE-2023-24055: CVE-2023-24055 POC written in PowerShell.
CVE-2023-24055 POC written in PowerShell. Contribute to duckbillsecurity/CVE-2023-24055 development by creating an account on GitHub.
#webshell
the only php webshell you need.
https://github.com/oldkingcone/slopShell
webshell
https://github.com/guillefix/guillefix.me
@BlueRedTeam
the only php webshell you need.
https://github.com/oldkingcone/slopShell
webshell
https://github.com/guillefix/guillefix.me
@BlueRedTeam
GitHub
GitHub - oldkingcone/slopShell: the only php webshell you need.
the only php webshell you need. Contribute to oldkingcone/slopShell development by creating an account on GitHub.
π2
#Cobalt_Strike
Collection of Beacon Object Files (BOF) for Cobalt Strike
https://github.com/REDMED-X/OperatorsKit
@BlueRedTeam
Collection of Beacon Object Files (BOF) for Cobalt Strike
https://github.com/REDMED-X/OperatorsKit
@BlueRedTeam
GitHub
GitHub - REDMED-X/OperatorsKit: Collection of Beacon Object Files (BOF) for Cobalt Strike
Collection of Beacon Object Files (BOF) for Cobalt Strike - REDMED-X/OperatorsKit
π1
#CVE-2023
CVE-2023-24055 PoC (KeePass 2.5x)
https://github.com/alt3kx/CVE-2023-24055_PoC
CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.
https://github.com/0xf4n9x/CVE-2023-0669
@BlueRedTeam
CVE-2023-24055 PoC (KeePass 2.5x)
https://github.com/alt3kx/CVE-2023-24055_PoC
CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.
https://github.com/0xf4n9x/CVE-2023-0669
@BlueRedTeam
GitHub
GitHub - alt3kx/CVE-2023-24055_PoC: CVE-2023-24055 PoC (KeePass 2.5x)
CVE-2023-24055 PoC (KeePass 2.5x). Contribute to alt3kx/CVE-2023-24055_PoC development by creating an account on GitHub.
β€1π1
#webshell
A PHP webshell to use when no exec-like functions is allowed
https://github.com/BorelEnzo/PoisonPrince
@BlueRedTeam
A PHP webshell to use when no exec-like functions is allowed
https://github.com/BorelEnzo/PoisonPrince
@BlueRedTeam
GitHub
GitHub - BorelEnzo/PoisonPrince: A PHP webshell to use when no exec-like function is allowed
A PHP webshell to use when no exec-like function is allowed - BorelEnzo/PoisonPrince
π2