PlumHound - BloodHoundAD Report Engine for Security Teams
https://github.com/DefensiveOrigins/PlumHound
https://github.com/DefensiveOrigins/PlumHound
GitHub
DefensiveOrigins/PlumHound
Bloodhound for Blue and Purple Teams. Contribute to DefensiveOrigins/PlumHound development by creating an account on GitHub.
Windows C# LLMNR/mDNS/NBNS/DNS/DHCPv6 spoofer/man-in-the-middle tool
https://github.com/Kevin-Robertson/InveighZero
https://github.com/Kevin-Robertson/InveighZero
GitHub
GitHub - Kevin-Robertson/InveighZero: .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers
.NET IPv4/IPv6 machine-in-the-middle tool for penetration testers - Kevin-Robertson/InveighZero
Introducing Shuffle — an Open Source SOAR platform part 1
https://medium.com/security-operation-capybara/introducing-shuffle-an-open-source-soar-platform-part-1-58a529de7d12
https://medium.com/security-operation-capybara/introducing-shuffle-an-open-source-soar-platform-part-1-58a529de7d12
Medium
Introducing Shuffle — an Open Source SOAR platform part 1
There are two big issues blueteams everywhere have: alert fatigue and a lack of coders. Read on to see how Shuffle can help..
Batch Binary Analysis with IDA Pro 7.4 Automation
https://irq5.io/2020/05/25/batch-binary-analysis-with-ida-pro-7-4-automation/amp/
https://irq5.io/2020/05/25/batch-binary-analysis-with-ida-pro-7-4-automation/amp/
irq5.io
Batch Binary Analysis with IDA Pro 7.4 Automation
It is easy to script analysis steps with IDAPython, but now we want to automate this analysis over, let’s say, 10,000 files. I did a quick Google and I couldn’t find a guide on how to p…
Empire, Kaspersky & Obfuscation oh my!
https://www.offensiveops.io/tools/empire-kaspersky-obfuscation-oh-my/
https://www.offensiveops.io/tools/empire-kaspersky-obfuscation-oh-my/
TrickBot BazarLoader In-Depth
https://cybersecurity.att.com/blogs/labs-research/trickbot-bazarloader-in-depth
https://cybersecurity.att.com/blogs/labs-research/trickbot-bazarloader-in-depth
LevelBlue
LevelBlue Labs Research Blog: Cutting-Edge Cybersecurity Analysis
Explore cutting-edge cybersecurity research and analysis from LevelBlue Labs. Gain deep insights into emerging threats and innovative defenses
When Anti-Virus Engines Look Like Kernel Rootkits
https://volatility-labs.blogspot.com/2020/05/when-anti-virus-engines-look-like.html
https://volatility-labs.blogspot.com/2020/05/when-anti-virus-engines-look-like.html
Blogspot
When Anti-Virus Engines Look Like Kernel Rootkits
While analyzing real-world systems, memory analysts will often encounter anti-virus (AV) engines, EDRs, and similar products that, at first ...
Automating a RedELK deployment using Ansible
https://www.trustedsec.com/blog/automating-a-redelk-deployment-using-ansible/
https://www.trustedsec.com/blog/automating-a-redelk-deployment-using-ansible/
TrustedSec
Automating a RedELK Deployment Using Ansible
Automate your RedELK infrastructure deployment with Ansible, streamlining your red team operations and enhancing visibility with a scalable ELK stack,…
Deep Learning for Insider Threat Detection: Review, Challenges and Opportunities
https://arxiv.org/pdf/2005.12433.pdf
https://arxiv.org/pdf/2005.12433.pdf
Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review
https://arxiv.org/pdf/2005.12267.pdf
https://arxiv.org/pdf/2005.12267.pdf
Automate OctopusC2 RedTeam infrastructure deployment
https://shells.systems/automate-octopus-c2-redteam-infrastructure-deployment/
https://shells.systems/automate-octopus-c2-redteam-infrastructure-deployment/
Shells.Systems
Automate Octopus C2 RedTeam Infrastructure Deployment - Shells.Systems
Estimated Reading Time: 15 minutes Establishing a red team infrastructure for your operation is something you need to take care of every time, and you need to make sure it’s working without any obstacles before you begin your operation. Every time I start…
Zero-day in ‘Sign In with Apple’
https://bhavukjain1.github.io/blog/2020/05/30/zeroday-signin-with-apple/
https://bhavukjain1.github.io/blog/2020/05/30/zeroday-signin-with-apple/
Detecting and Advancing In-Memory .NET Tradecraft
https://www.mdsec.co.uk/2020/06/detecting-and-advancing-in-memory-net-tradecraft/
https://www.mdsec.co.uk/2020/06/detecting-and-advancing-in-memory-net-tradecraft/
MDSec
Detecting and Advancing In-Memory .NET Tradecraft - MDSec
Introduction In-memory tradecraft is becoming more and more important for remaining undetected during a red team operation, with it becoming common practice for blue teams to peek in to running...
In-depth analysis of the new Team9 malware family
https://blog.fox-it.com/2020/06/02/in-depth-analysis-of-the-new-team9-malware-family/
https://blog.fox-it.com/2020/06/02/in-depth-analysis-of-the-new-team9-malware-family/
Fox-IT International blog
In-depth analysis of the new Team9 malware family
Author: Nikolaos Pantazopoulos Co-author: Stefano Antenucci (@Antelox) And in close collaboration with NCC’s RIFT. 1. Introduction Publicly discovered in late April 2020, the Team9 malware fa…
Attacking FreeIPA — Part III: Finding A Path
https://posts.specterops.io/attacking-freeipa-part-iii-finding-a-path-677405b5b95e
https://posts.specterops.io/attacking-freeipa-part-iii-finding-a-path-677405b5b95e
Medium
Attacking FreeIPA — Part III: Finding A Path
This post is Part III in a series about my experiences attacking FreeIPA. In Part I of this series, we reviewed some of the background and…
Active Directory security assessment checklist (-> English version)
https://www.cert.ssi.gouv.fr/uploads/guide-ad.html
https://www.cert.ssi.gouv.fr/uploads/guide-ad.html
Using Syscalls to Inject Shellcode on Windows
https://www.solomonsklash.io/syscalls-for-shellcode-injection.html
https://www.solomonsklash.io/syscalls-for-shellcode-injection.html
shad0w is a post exploitation framework designed to operate covertly on heavily monitored enviroments
https://github.com/bats3c/shad0w
https://github.com/bats3c/shad0w
GitHub
GitHub - bats3c/shad0w: A post exploitation framework designed to operate covertly on heavily monitored environments
A post exploitation framework designed to operate covertly on heavily monitored environments - bats3c/shad0w
Apache Tomcat RCE by deserialization (CVE-2020-9484) – write-up and exploit
https://www.redtimmy.com/java-hacking/apache-tomcat-rce-by-deserialization-cve-2020-9484-write-up-and-exploit/
https://www.redtimmy.com/java-hacking/apache-tomcat-rce-by-deserialization-cve-2020-9484-write-up-and-exploit/