From spoofing to tunnelling: New Red Team networking techniques for initial access and evasion
blog.apnic.net/2026/01/16/f...
#infosec #redteam
From spoofing to tunnelling: New Red Team networking techniques for initial access and evasion
blog.apnic.net/2026/01/16/f...
#infosec #redteam
TaskHound hunts privileged Windows scheduled tasks and exports them for BloodHound attack path analysis.
github.com/1r0BIT/TaskH...
#infosec #pentest #redteam
NetExec Lab is a set of hands-on labs used in the NetExec workshop and CTF to help you mastering NetExec for your next pentest engagement.
github.com/Pennyw0rth/N...
#infosec #pentest
Extracts browser-stored data such as refresh tokens, cookies, saved credentials and more from modern Chromium-based and Gecko-based browsers (Chrome, Microsoft Edge, Firefox, Opera, Opera GX and Vivaldi).
github.com/Maldev-Acade...
#infosec #pentest #redteam
Many cybersecurity myths are outdated and distract from real risks. An open letter calling for practical, evidence-based security advice.
Read more: www.hacklore.org/letter
#infosec
ProfileHound is a tool that enumerates Windows domain user profiles via the C$ share and exports them to BloodHound as a HasUserProfile edge making it easy to see which users have profiles on which hosts.
github.com/m4lwhere/pro...
#infosec #pentest #redteam
Native Sysmon functionality coming to Windows
techcommunity.microsoft.com/blog/windows...
#infosec #blueteam
"HELP! MY ACCOUNT GOT HACKED!" - Business Email Compromise (BEC) Part 1
www.truesec.com/hub/blog/hel...
"The Anatomy of a Business Email Compromise Attack" - Business Email Compromise (BEC) Part 2
www.truesec.com/hub/blog/the...
#infosec #blueteam
Harden Windows Security is an open source PowerShell module (with GUI/CLI/Unattended mode) that documents, automates and hardens Windows security settings based on supported Microsoft mechanisms
github.com/HotCakeX/Har...
#infosec #blueteam
Prowler is an open-source security tool that helps assess and enforce security best practices across AWS, Azure, Google Cloud and Kubernetes.
github.com/prowler-clou...
#infosec #blueteam
Ransomware Tool Matrix by @bushidotoken.net: This repository lists tools used by ransomware gangs. Defenders can detect and block these commonly reused tools to stop intrusions.
github.com/BushidoUK/Ra...
#infosec #blueteam
State-of-the-art phishing: MFA bypass by Jaeson Schultz @talosintelligence.com
blog.talosintelligence.com/state-of-the...
#infosec #blueteam
ArgFuscator is an open-source web app that generates obfuscated command lines for common system tools. Great for testing your defenses against real-world attack techniques.
argfuscator.net
#infosec #pentest #redteam #blueteam
How well do you protect your privacy?
The Privacy Checkup helps you assess your online surveillance defenses and take steps to protect your data.
privacy-checkup.info (English, Deutsch, EspaΓ±ol)
#privacy #infosec
A great read on the exploitation of VMware vulnerabilities - from both attacker and defender perspectives - plus practical recommendations to strengthen your security posture.
"Breaking the Virtual Barrier: From Web-Shell to Ransomware"
www.sygnia.co/threat-repor...
#infosec #blueteam
Eine kriminelle Organisation hinter mehr als 75.000 Fake-Shops, >1 Mio. Bestellungen & >$50M Schaden. Einblick in ihr ausgeklΓΌgeltes System & wie sie KΓ€ufer tΓ€uschen.
#38C3: "Fake-Shops von der Stange: BogusBazaar" mit @kaibiermann.bsky.social und kantorkel.
media.ccc.de/v/38c3-fake-...
#infosec
"Mastering Sysmon: Deploying, Configuring, and Fine-Tuning"
A free mini eBook for #DFIR professionals with practical steps to deploy, fine-tune, and start logging with Sysmon.
dfirinsights.com/2024/11/27/m...
#infosec #blueteam
Welche Daten enthΓ€lt die elektronische #Patientenakte und was bedeutet sie fΓΌr die Γ€rztliche Schweigepflicht?
Carseat is a Python implementation of GhostPack's Seatbelt, a situational awareness tool for analyzing Windows security configurations.
github.com/0xthirteen/C...
#infosec #pentest #redteam
The fascinating security model of dark web marketplaces by @boehs.org
boehs.org/node/dark-we...
#infosec
That's a Cybersecurity Advisory worth reading, with many important points to note.
Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization
www.cisa.gov/news-events/...
#infosec #blueteam
LOLESXi features a comprehensive list of binaries/scripts natively available in VMware ESXi that adversaries have utilised in their operations.
lolesxi-project.github.io/LOLESXi/
#infosec #pentest #redteam #blueteam
Phishing remains one of the most widespread cyberattacks - here are some tips on how to avoid falling victim!
5 Phishing Email Scams and How NOT To Fall For Them
www.huntress.com/blog/5-phish...
#infosec
π¨ Exciting news for all hackers and tech enthusiasts! The #DEFCON32 talks are now available on YouTube! π
youtube.com/playlist?lis...
#infosec #pentest #redteam #blueteam
A tool that uses the Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
github.com/netero1010/E...
#infosec #pentest #redteam
Spannend & unterhaltsam: Die #BigBrotherAwards prΓ€mieren jedes Jahr die grΓΆΓten DatensΓΌnder in Wirtschaft & Politik!
BigBrotherAwards 2024: PreistrΓ€ger, Bilder und Livestream unter bigbrotherawards.de/2024
Also available in English: bigbrotherawards.de/en/2024
#infosec #BBA24
Guidance on Detecting and Mitigating Active Directory Compromises
www.cisa.gov/news-events/...
#infosec #blueteam
Event Log Talks a Lot: Identifying Human-operated Ransomware through Windows Event Logs
blogs.jpcert.or.jp/en/2024/09/w...
#infosec #blueteam
Active Directory Hardening Series - Part 5 - Enforcing LDAP Channel Binding
techcommunity.microsoft.com/t5/core-infr...
#infosec #blueteam
SharpExclusionFinder: This C# tool finds Windows Defender folder exclusions using Windows Defender through its command-line tool (MpCmdRun.exe)
github.com/Friends-Secu...
A blog explaining the technique utilised can be viewed here: blog.fndsec.net/2024/10/04/u...
#infosec #pentest #redteam