Forwarded from Open Source intelligence [ OSINT ]
Beginners Field Guide: Where & How to Learn OSINT
This is not a comprehensive collection of resources. This collection is based on my own time spent on open-source intelligence. There are a million links with OSINT tools that can get the job done but this post is curated to point you in the right direction to obtain the necessary skills and mindset to get the job done. β EXTRA SECTION β FRAMEWORK FOR BEGINNERS
https://medium.com/the-sleuth-sheet/beginners-field-guide-where-how-to-learn-osint-bd2e11469f31
@OsintBlackBox
This is not a comprehensive collection of resources. This collection is based on my own time spent on open-source intelligence. There are a million links with OSINT tools that can get the job done but this post is curated to point you in the right direction to obtain the necessary skills and mindset to get the job done. β EXTRA SECTION β FRAMEWORK FOR BEGINNERS
https://medium.com/the-sleuth-sheet/beginners-field-guide-where-how-to-learn-osint-bd2e11469f31
@OsintBlackBox
Medium
Beginners Field Guide: Where & How to Learn OSINT
Discover, Uncover, Analyze: Master OSINT, Empower Intelligence Skills.
#Red_Team
These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming
https://github.com/sho-luv/chatgpt_created_tools
@BlueRedTeam
These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming
https://github.com/sho-luv/chatgpt_created_tools
@BlueRedTeam
GitHub
GitHub - sho-luv/gpt_tools: These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming
These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming - sho-luv/gpt_tools
π1
#CVE-2023
CVE-2023-0669 Encrpytion helper
https://github.com/yosef0x01/CVE-2023-0669
Poc for CVE-2023-23752 (joomla CMS)
https://github.com/WhiteOwl-Pub/CVE-2023-23752
@BlueRedTeam
CVE-2023-0669 Encrpytion helper
https://github.com/yosef0x01/CVE-2023-0669
Poc for CVE-2023-23752 (joomla CMS)
https://github.com/WhiteOwl-Pub/CVE-2023-23752
@BlueRedTeam
#webshell
php webshell
https://github.com/n01ep3rz/upsilon-shell
webshell
https://github.com/cannibal-hannibal/Tess
A secure webshell
https://github.com/mickael-kerjean/webpty
@BlueRedTeam
php webshell
https://github.com/n01ep3rz/upsilon-shell
webshell
https://github.com/cannibal-hannibal/Tess
A secure webshell
https://github.com/mickael-kerjean/webpty
@BlueRedTeam
β€1π1
#Red_Team
Red team penetration testing, intranet asset detection, general vulnerability scanning, weak password blasting, port forwarding, intranet penetration, SOCK5
https://github.com/rustgopy/RGPScan
@BlueRedTeam
Red team penetration testing, intranet asset detection, general vulnerability scanning, weak password blasting, port forwarding, intranet penetration, SOCK5
https://github.com/rustgopy/RGPScan
@BlueRedTeam
GitHub
GitHub - rustgopy/RGPScan: ηΊ’ιζΈιζ΅θ―γε
η½θ΅δΊ§ζ’ζ΅γιη¨ζΌζ΄ζ«ζγεΌ±ε£δ»€ηη ΄
ηΊ’ιζΈιζ΅θ―γε
η½θ΅δΊ§ζ’ζ΅γιη¨ζΌζ΄ζ«ζγεΌ±ε£δ»€ηη ΄. Contribute to rustgopy/RGPScan development by creating an account on GitHub.
#webshell
A Python script that connects to a webshell to create a sudo-interactive terminal session.
https://github.com/malwaredetective/pyshell
php webshell
https://github.com/devilbhai/webshell
@BlueRedTeam
A Python script that connects to a webshell to create a sudo-interactive terminal session.
https://github.com/malwaredetective/pyshell
php webshell
https://github.com/devilbhai/webshell
@BlueRedTeam
GitHub
GitHub - malwaredetective/pyshell: A Python script that connects to a webshell to create a sudo-interactive terminal session.
A Python script that connects to a webshell to create a sudo-interactive terminal session. - malwaredetective/pyshell
#Red_Team
Materials for the workshop \"Red Team Ops: Havoc 101\"
https://github.com/WesleyWong420/RedTeamOps-Havoc-101
@BlueRedTeam
Materials for the workshop \"Red Team Ops: Havoc 101\"
https://github.com/WesleyWong420/RedTeamOps-Havoc-101
@BlueRedTeam
GitHub
GitHub - WesleyWong420/RedTeamOps-Havoc-101: Materials for the workshop "Red Team Ops: Havoc 101"
Materials for the workshop "Red Team Ops: Havoc 101" - WesleyWong420/RedTeamOps-Havoc-101
#Cobalt_Strike
Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature
https://github.com/Mav3rick33/ZenLdr
@BlueRedTeam
Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature
https://github.com/Mav3rick33/ZenLdr
@BlueRedTeam
GitHub
GitHub - Mav3rick33/ZenLdr: Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature
Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature - Mav3rick33/ZenLdr
π1
#Red_Team
Recon scripts for Red Team and Web blackbox auditing
https://github.com/mtimani/Recon_scripts
@BlueRedTeam
Recon scripts for Red Team and Web blackbox auditing
https://github.com/mtimani/Recon_scripts
@BlueRedTeam
π1
#Cobalt_Strike
It's just un implementation of in-house CoffLoader supporting #CobaltStrike standard BOF and BSS initialized variables.
Look at the main.c file to change the BOF and its parameters. CobalStrike handles the BOF parameter in a special way, the Arg structure is here to pass parameters easier.
https://github.com/OtterHacker/CoffLoader
@BlueRedTeam
It's just un implementation of in-house CoffLoader supporting #CobaltStrike standard BOF and BSS initialized variables.
Look at the main.c file to change the BOF and its parameters. CobalStrike handles the BOF parameter in a special way, the Arg structure is here to pass parameters easier.
https://github.com/OtterHacker/CoffLoader
@BlueRedTeam
GitHub
GitHub - OtterHacker/CoffLoader
Contribute to OtterHacker/CoffLoader development by creating an account on GitHub.
ββPython parser for #Cobalt_Strike stagers
Use parse_stager_config.py to search a file for Cobalt Strike stager shellcode. If shellcode is found, it will be extracted in JSON format.
https://github.com/stairwell-inc/cobalt-strike-stager-parser
@BlueRedTeam
Use parse_stager_config.py to search a file for Cobalt Strike stager shellcode. If shellcode is found, it will be extracted in JSON format.
https://github.com/stairwell-inc/cobalt-strike-stager-parser
@BlueRedTeam
GitHub
GitHub - stairwell-inc/cobalt-strike-stager-parser
Contribute to stairwell-inc/cobalt-strike-stager-parser development by creating an account on GitHub.
π1
#Red_Team
Collection of tooling to use on Red Team engagements.
https://github.com/burnbrian/redteam-tooling
A curated list of Cybersecurity tools for Penetration Testing or Red Teaming.
https://github.com/q0phi80/CybersecurityTools
Eden Red Teaming
https://github.com/Eden-Advisory/altakahun
@BlueRedTeam
Collection of tooling to use on Red Team engagements.
https://github.com/burnbrian/redteam-tooling
A curated list of Cybersecurity tools for Penetration Testing or Red Teaming.
https://github.com/q0phi80/CybersecurityTools
Eden Red Teaming
https://github.com/Eden-Advisory/altakahun
@BlueRedTeam
#Cobalt_Strike
All in 1 repo for anything and everything I work with that is Cobalt Strike related.
https://github.com/Altoid0/CobaltStrike-Library
@BlueRedTeam
All in 1 repo for anything and everything I work with that is Cobalt Strike related.
https://github.com/Altoid0/CobaltStrike-Library
@BlueRedTeam
π1
#Red_Team
Collection of tooling to use on Red Team engagements.
https://github.com/burnbrian/redteam-utilities
@BlueRedTeam
Collection of tooling to use on Red Team engagements.
https://github.com/burnbrian/redteam-utilities
@BlueRedTeam
#Red_Team
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
https://github.com/PaulNorman01/Forensia
@BlueRedTeam
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
https://github.com/PaulNorman01/Forensia
@BlueRedTeam
GitHub
GitHub - PaulNorman01/Forensia: Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase. - PaulNorman01/Forensia
#Cobalt_Strike
Support Cobalt Strike's security assessment of other platforms (Linux/MacOS/...), and include the development support of Unix post-penetration module.
https://github.com/gloxec/CrossC2
Wiki π https://gloxec.github.io/CrossC2/en/
@BlueRedTeam
Support Cobalt Strike's security assessment of other platforms (Linux/MacOS/...), and include the development support of Unix post-penetration module.
https://github.com/gloxec/CrossC2
Wiki π https://gloxec.github.io/CrossC2/en/
@BlueRedTeam
GitHub
GitHub - gloxec/CrossC2: generate CobaltStrike's cross-platform payload
generate CobaltStrike's cross-platform payload. Contribute to gloxec/CrossC2 development by creating an account on GitHub.