#Red_Team
This is a template to show how the Red Team will structure files
https://github.com/stevenshow/File-Structure
@BlueRedTeam
This is a template to show how the Red Team will structure files
https://github.com/stevenshow/File-Structure
@BlueRedTeam
GitHub
GitHub - stevenshow/File-Structure: This is a template to show how the Red Team will structure files
This is a template to show how the Red Team will structure files - stevenshow/File-Structure
#Red_Team
This is a template to show how the Red Team will structure files
https://github.com/halbeeb/Cloud-Warehouse-AWS-Redshift
@BlueRedTeam
This is a template to show how the Red Team will structure files
https://github.com/halbeeb/Cloud-Warehouse-AWS-Redshift
@BlueRedTeam
GitHub
GitHub - halbeeb/Cloud-Warehouse-AWS-Redshift: This project builds an ELT pipeline that extracts data from S3, stages them in Redshiftβ¦
This project builds an ELT pipeline that extracts data from S3, stages them in Redshift, and transforms data into a set of dimensional tables for Sparkify analytics team to continue finding insight...
π3
This channel is only about Red Team.
Follow the contents of Blue Team from this @BlueTeamKit channel.
Follow the contents of Blue Team from this @BlueTeamKit channel.
π7
#CVE-2023
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-20916
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-22664
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
https://github.com/hacksysteam/CVE-2023-21608
@BlueRedTeam
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-20916
CVE-2023-23924 PoC
https://github.com/Live-Hack-CVE/CVE-2023-22664
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
https://github.com/hacksysteam/CVE-2023-21608
@BlueRedTeam
GitHub
GitHub - hacksysteam/CVE-2023-21608: Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit - hacksysteam/CVE-2023-21608
π1
#CVE-2023
PowerShell POC for CVE-2023-24055
https://github.com/ATTACKnDEFEND/CVE-2023-24055
PowerShell POC for CVE-2023-24055
https://github.com/Live-Hack-CVE/CVE-2023-22458
@BlueRedTeam
PowerShell POC for CVE-2023-24055
https://github.com/ATTACKnDEFEND/CVE-2023-24055
PowerShell POC for CVE-2023-24055
https://github.com/Live-Hack-CVE/CVE-2023-22458
@BlueRedTeam
GitHub
GitHub - duckbillsecurity/CVE-2023-24055: CVE-2023-24055 POC written in PowerShell.
CVE-2023-24055 POC written in PowerShell. Contribute to duckbillsecurity/CVE-2023-24055 development by creating an account on GitHub.
#webshell
the only php webshell you need.
https://github.com/oldkingcone/slopShell
webshell
https://github.com/guillefix/guillefix.me
@BlueRedTeam
the only php webshell you need.
https://github.com/oldkingcone/slopShell
webshell
https://github.com/guillefix/guillefix.me
@BlueRedTeam
GitHub
GitHub - oldkingcone/slopShell: the only php webshell you need.
the only php webshell you need. Contribute to oldkingcone/slopShell development by creating an account on GitHub.
π2
#Cobalt_Strike
Collection of Beacon Object Files (BOF) for Cobalt Strike
https://github.com/REDMED-X/OperatorsKit
@BlueRedTeam
Collection of Beacon Object Files (BOF) for Cobalt Strike
https://github.com/REDMED-X/OperatorsKit
@BlueRedTeam
GitHub
GitHub - REDMED-X/OperatorsKit: Collection of Beacon Object Files (BOF) for Cobalt Strike
Collection of Beacon Object Files (BOF) for Cobalt Strike - REDMED-X/OperatorsKit
π1
#CVE-2023
CVE-2023-24055 PoC (KeePass 2.5x)
https://github.com/alt3kx/CVE-2023-24055_PoC
CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.
https://github.com/0xf4n9x/CVE-2023-0669
@BlueRedTeam
CVE-2023-24055 PoC (KeePass 2.5x)
https://github.com/alt3kx/CVE-2023-24055_PoC
CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.
https://github.com/0xf4n9x/CVE-2023-0669
@BlueRedTeam
GitHub
GitHub - alt3kx/CVE-2023-24055_PoC: CVE-2023-24055 PoC (KeePass 2.5x)
CVE-2023-24055 PoC (KeePass 2.5x). Contribute to alt3kx/CVE-2023-24055_PoC development by creating an account on GitHub.
β€1π1
#webshell
A PHP webshell to use when no exec-like functions is allowed
https://github.com/BorelEnzo/PoisonPrince
@BlueRedTeam
A PHP webshell to use when no exec-like functions is allowed
https://github.com/BorelEnzo/PoisonPrince
@BlueRedTeam
GitHub
GitHub - BorelEnzo/PoisonPrince: A PHP webshell to use when no exec-like function is allowed
A PHP webshell to use when no exec-like function is allowed - BorelEnzo/PoisonPrince
π2
#Red_Team
S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
https://github.com/blackhatethicalhacking/S3cr3tDetect0rz
@BlueRedTeam
S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
https://github.com/blackhatethicalhacking/S3cr3tDetect0rz
@BlueRedTeam
GitHub
GitHub - blackhatethicalhacking/SecretOpt1c: SecretOpt1c is a Red Team tool that helps uncover sensitive information in websitesβ¦
SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accuracy! - blackhatethicalhacking/SecretOpt1c
#CVE-2023
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
https://github.com/Malwareman007/CVE-2023-21608
@BlueRedTeam
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
https://github.com/Malwareman007/CVE-2023-21608
@BlueRedTeam
GitHub
GitHub - Malwareman007/CVE-2023-21608: Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit - Malwareman007/CVE-2023-21608
π1
#Red_Team
Collection of PoC and offensive techniques used by the BlackArrow Red Team
https://github.com/blackarrowsec/redteam-research
@BlueRedTeam
Collection of PoC and offensive techniques used by the BlackArrow Red Team
https://github.com/blackarrowsec/redteam-research
@BlueRedTeam
GitHub
GitHub - blackarrowsec/redteam-research: Collection of PoC and offensive techniques used by the BlackArrow Red Team
Collection of PoC and offensive techniques used by the BlackArrow Red Team - blackarrowsec/redteam-research
π1
#Red_Team
VagrantFile and supporting resources for building a Red Team kali image
https://github.com/dowrite/rtkali
@BlueRedTeam
VagrantFile and supporting resources for building a Red Team kali image
https://github.com/dowrite/rtkali
@BlueRedTeam
GitHub
GitHub - dowrite/rtkali: VagrantFile and supporting resources for building a Red Team kali image
VagrantFile and supporting resources for building a Red Team kali image - dowrite/rtkali
π2π₯1
#Red_Team
Red Team utilities for setting up CWP CentOS 7 payload & reverse shell, as it refers to CVE-2022-44877
https://github.com/hotpotcookie/cwp-rce-white-box
@BlueRedTeam
Red Team utilities for setting up CWP CentOS 7 payload & reverse shell, as it refers to CVE-2022-44877
https://github.com/hotpotcookie/cwp-rce-white-box
@BlueRedTeam
GitHub
GitHub - hotpotcookie/CVE-2022-44877-white-box: Red Team utilities for setting up CWP CentOS 7 payload & reverse shell (Red Teamβ¦
Red Team utilities for setting up CWP CentOS 7 payload & reverse shell (Red Team 9 - CW2023) - hotpotcookie/CVE-2022-44877-white-box
If you are a skilled and experienced network penetration tester looking to connect with like-minded individuals for a meetup, please message me. Let's get acquainted and network.
Contact: @NetPwn
Contact: @NetPwn
β€3
#CVE-2023
CVE-2023-0669 GoAnywhere MFT command injection vulnerability
https://github.com/cataiovita/CVE-2023-0669
CVE-2023-0669 GoAnywhere MFT command injection vulnerability
https://github.com/Live-Hack-CVE/CVE-2023-22855
@BlueRedTeam
CVE-2023-0669 GoAnywhere MFT command injection vulnerability
https://github.com/cataiovita/CVE-2023-0669
CVE-2023-0669 GoAnywhere MFT command injection vulnerability
https://github.com/Live-Hack-CVE/CVE-2023-22855
@BlueRedTeam
GitHub
GitHub - cataliniovita/CVE-2023-0669: CVE-2023-0669 GoAnywhere MFT command injection vulnerability
CVE-2023-0669 GoAnywhere MFT command injection vulnerability - cataliniovita/CVE-2023-0669
π2
#Red_Team
S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
https://github.com/ice-wzl/wmiexec2.0
@BlueRedTeam
S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
https://github.com/ice-wzl/wmiexec2.0
@BlueRedTeam
GitHub
GitHub - ice-wzl/wmiexec2: wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscatedβ¦
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additiona...