THM RT.zip
100.9 MB
#Leaked โก๏ธ
Learn the skills needed to become a Red Team Operator
Use diverse techniques for initial access
Enumerate and persist on targets`
Evade security solutions
Exploit Active Directory
Level: Intermediate | 48 hours
@redteamcollection
Red Teaming tryhackme ๐งโ๐ปLearn the skills needed to become a Red Team Operator
Use diverse techniques for initial access
Enumerate and persist on targets`
Evade security solutions
Exploit Active Directory
Level: Intermediate | 48 hours
@redteamcollection
โโโโ1 Red Team Fundamentals
โ โโโโTryHackMe _ Intro to C2_files
โ โโโโTryHackMe _ Red Team Engagements_files
โ โโโโTryHackMe _ Red Team Fundamentals_files
โ โโโโTryHackMe _ Red Team OPSEC_files
โ โโโโTryHackMe _ Red Team Threat Intel_files
โโโโ2 Initial Access
โ โโโโTryHackMe _ Password Attacks_files
โ โโโโTryHackMe _ Phishing_files
โ โโโโTryHackMe _ Red Team Recon_files
โ โโโโTryHackMe _ Weaponization_files
โโโโ3 Post Compromise
โ โโโโTryHackMe _ Data Exfiltration_files
โ โโโโTryHackMe _ Enumeration_files
โ โโโโTryHackMe _ Lateral Movement and Pivoting_files
โ โโโโTryHackMe _ The Lay of the land_files
โ โโโโTryHackMe _ Windows Local Persistence_files
โ โโโโTryHackMe _ Windows Privilege Escalation_files
โโโโ4 Host Evasions
โ โโโโTryHackMe _ Abusing Windows Internals_files
โ โโโโTryHackMe _ AV Evasion_ Shellcode_files
โ โโโโTryHackMe _ Bypassing UAC_files
โ โโโโTryHackMe _ Evading Logging and Monitoring_files
โ โโโโTryHackMe _ Introduction to Antivirus_files
โ โโโโTryHackMe _ Introduction to Windows API_files
โ โโโโTryHackMe _ Living Off the Land_files
โ โโโโTryHackMe _ Obfuscation Principles_files
โ โโโโTryHackMe _ Runtime Detection Evasion_files
โ โโโโTryHackMe _ Signature Evasion_files
โ โโโโTryHackMe _ Windows Internals_files
โโโโ5 Network Scurity Evasion
โ โโโโTryHackMe _ Firewalls_files
โ โโโโTryHackMe _ Network Security Solutions_files
โ โโโโTryHackMe _ Sandbox Evasion_files
โโโโ6 Compromising AD
โโโโTryHackMe _ Active Directory Basics_files
โโโโTryHackMe _ Breaching Active Directory_files
โโโโTryHackMe _ Credentials Harvesting_files
โโโโTryHackMe _ Enumerating Active Directory_files
โโโโTryHackMe _ Exploiting Active Directory_files
โโโโTryHackMe _ Lateral Movement and Pivoting_files
โโโโTryHackMe _ Persisting Active Directory_files
โ โโโโTryHackMe _ Intro to C2_files
โ โโโโTryHackMe _ Red Team Engagements_files
โ โโโโTryHackMe _ Red Team Fundamentals_files
โ โโโโTryHackMe _ Red Team OPSEC_files
โ โโโโTryHackMe _ Red Team Threat Intel_files
โโโโ2 Initial Access
โ โโโโTryHackMe _ Password Attacks_files
โ โโโโTryHackMe _ Phishing_files
โ โโโโTryHackMe _ Red Team Recon_files
โ โโโโTryHackMe _ Weaponization_files
โโโโ3 Post Compromise
โ โโโโTryHackMe _ Data Exfiltration_files
โ โโโโTryHackMe _ Enumeration_files
โ โโโโTryHackMe _ Lateral Movement and Pivoting_files
โ โโโโTryHackMe _ The Lay of the land_files
โ โโโโTryHackMe _ Windows Local Persistence_files
โ โโโโTryHackMe _ Windows Privilege Escalation_files
โโโโ4 Host Evasions
โ โโโโTryHackMe _ Abusing Windows Internals_files
โ โโโโTryHackMe _ AV Evasion_ Shellcode_files
โ โโโโTryHackMe _ Bypassing UAC_files
โ โโโโTryHackMe _ Evading Logging and Monitoring_files
โ โโโโTryHackMe _ Introduction to Antivirus_files
โ โโโโTryHackMe _ Introduction to Windows API_files
โ โโโโTryHackMe _ Living Off the Land_files
โ โโโโTryHackMe _ Obfuscation Principles_files
โ โโโโTryHackMe _ Runtime Detection Evasion_files
โ โโโโTryHackMe _ Signature Evasion_files
โ โโโโTryHackMe _ Windows Internals_files
โโโโ5 Network Scurity Evasion
โ โโโโTryHackMe _ Firewalls_files
โ โโโโTryHackMe _ Network Security Solutions_files
โ โโโโTryHackMe _ Sandbox Evasion_files
โโโโ6 Compromising AD
โโโโTryHackMe _ Active Directory Basics_files
โโโโTryHackMe _ Breaching Active Directory_files
โโโโTryHackMe _ Credentials Harvesting_files
โโโโTryHackMe _ Enumerating Active Directory_files
โโโโTryHackMe _ Exploiting Active Directory_files
โโโโTryHackMe _ Lateral Movement and Pivoting_files
โโโโTryHackMe _ Persisting Active Directory_files
XRY Reader to XAMN Viewer transition course
Module 1:
https://bit.ly/2tgjipU
Module 2:
https://bit.ly/2DBrHJc
Module 3:
https://bit.ly/2RSAmfH
Module 4:
https://bit.ly/2N0uZu0
password for the course is โ
Module 1:
https://bit.ly/2tgjipU
Module 2:
https://bit.ly/2DBrHJc
Module 3:
https://bit.ly/2RSAmfH
Module 4:
https://bit.ly/2N0uZu0
password for the course is โ
xamnviewerโCELLEBRITE AND MSAB
Cellebrite magnet link:
Cellebrite magnet link:
magnet:?xt=urn:btih:f881291ab69fff48393ede2e36a4f8fcb4b5bf7a&dn=cellebrite&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A6969%2Fannounce&tr=https%3A%2F%2Fopentracker.i2p.rocks%3A443%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce
MSAB download link:magnet:?xt=urn:btih:0e7d11a34f71887aca3a388795e0b019cca44858&dn=msab.tar.zst&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A6969%2Fannounce&tr=https%3A%2F%2Fopentracker.i2p.rocks%3A443%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounceโจ
๐งต๐ง๐ง๐ง๐ง๐ง
๐งตโฌ๏ธโฌ๏ธ๐ตโฌโฌ
๐งต๐ฉ๐ฉ๐ฉ๐ฉ๐ฉ
๐งต ๐ฟ
๐งต ๐บ
๐งต ๐ฑ ๐ธ
๐งต ๐
๐งต ๐ ๐
๐งต
๐งต ๐ ๐บ
๐งต
๐งต๐ ๐ ๐
๐งต ๐บ
๐งต ๐ธ
๐๐๐
๐๐๐๐
๐๐๐๐๐
โโโโโโโโโโโโโโโโโโโโโโ
๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณ
โโโโโโโโโโโโโโโโโโโโโโ
HAPPY REPUBLIC DAY ๐ ๐
โโโโโโโโโโโโโโโโโโโโโโ
๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณ
โโโโโโโโโโโโโโโโโโโโโโ
๐ฅ๐ ๐๐ฎ ๐๐๐ฃ๐ ๐ ๐๐ฎ ๐ฝ๐๐๐ง๐๐ฉ๐ฅ
๐ฎ๐ณ๐๐๐๐๐ 74๐ญ๐ก ๐๐๐๐๐๐๐๐ ๐๐๐
๐งต๐ง๐ง๐ง๐ง๐ง
๐งตโฌ๏ธโฌ๏ธ๐ตโฌโฌ
๐งต๐ฉ๐ฉ๐ฉ๐ฉ๐ฉ
๐งต ๐ฟ
๐งต ๐บ
๐งต ๐ฑ ๐ธ
๐งต ๐
๐งต ๐ ๐
๐งต
๐งต ๐ ๐บ
๐งต
๐งต๐ ๐ ๐
๐งต ๐บ
๐งต ๐ธ
๐๐๐
๐๐๐๐
๐๐๐๐๐
โโโโโโโโโโโโโโโโโโโโโโ
๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณ
โโโโโโโโโโโโโโโโโโโโโโ
HAPPY REPUBLIC DAY ๐ ๐
โโโโโโโโโโโโโโโโโโโโโโ
๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณ
โโโโโโโโโโโโโโโโโโโโโโ
๐ฅ๐ ๐๐ฎ ๐๐๐ฃ๐ ๐ ๐๐ฎ ๐ฝ๐๐๐ง๐๐ฉ๐ฅ
๐ฎ๐ณ๐๐๐๐๐ 74๐ญ๐ก ๐๐๐๐๐๐๐๐ ๐๐๐
QRLJackerQRLJacker is a highly customizable exploitation framework to hijack services that depend on QR Code as an authentication and login method
OWASP's links reference
https://www.owasp.org/index.php/QRLJacking
https://www.owasp.org/index.php/OWASP_QRLJacker
If you want to write your own module
Read here
โ๏ธ Github repositories every Developer should know โ๏ธ
โ๏ธA very popular repo that curates all topics from Development, testing, business, etc, etc.
https://github.com/sindresorhus/awesome
โ๏ธClean Code JavaScript
https://github.com/ryanmcdermott/clean-code-javascript
โ๏ธTech Interview Handbook
https://github.com/yangshun/tech-interview-handbook
โ๏ธDeveloper Roadmaps, articles and resources for developers.
https://github.com/kamranahmedse/developer-roadmap
โ๏ธ33 JS Concepts
https://github.com/leonardomso/33-js-concepts
โ๏ธBest websites a programmer should visit
https://github.com/sdmg15/Best-websites-a-programmer-should-visit
โ๏ธDesign Resources for Developers
https://github.com/bradtraversy/design-resources-for-developers
โ๏ธBig List of Naughty Strings:
https://github.com/minimaxir/big-list-of-naughty-strings
โ๏ธA very popular repo that curates all topics from Development, testing, business, etc, etc.
https://github.com/sindresorhus/awesome
โ๏ธClean Code JavaScript
https://github.com/ryanmcdermott/clean-code-javascript
โ๏ธTech Interview Handbook
https://github.com/yangshun/tech-interview-handbook
โ๏ธDeveloper Roadmaps, articles and resources for developers.
https://github.com/kamranahmedse/developer-roadmap
โ๏ธ33 JS Concepts
https://github.com/leonardomso/33-js-concepts
โ๏ธBest websites a programmer should visit
https://github.com/sdmg15/Best-websites-a-programmer-should-visit
โ๏ธDesign Resources for Developers
https://github.com/bradtraversy/design-resources-for-developers
โ๏ธBig List of Naughty Strings:
https://github.com/minimaxir/big-list-of-naughty-strings
GitHub
GitHub - sindresorhus/awesome: ๐ Awesome lists about all kinds of interesting topics
๐ Awesome lists about all kinds of interesting topics - sindresorhus/awesome
The repository includes links to various tools, frameworks, and resources that can be used by Red Teamers to conduct attacks, as well as resources for defenders to improve their security posture.
The repository is organized into several categories, including reconnaissance and information gathering, exploitation, post-exploitation, and defense evasion. Each category contains links to various tools and resources that can be used in Red Team Operations.
Some of the tools and frameworks included in the repository are well-known and widely used, such as Metasploit, Cobalt Strike, and Empire. Other tools and frameworks are less well-known but still valuable for Red Team Operations, such as BloodHound, which is used for Active Directory reconnaissance, and GoPhish, which is used for phishing simulations.
In addition to tools and frameworks, the repository also includes links to blogs, articles, and other resources that provide guidance on conducting Red Team Operations and improving overall security posture. These resources cover a wide range of topics, including social engineering, network infrastructure, and application security.
Overall, the "Awesome-Red-Team-Operations" repository is a valuable resource for Red Teamers, defenders, and anyone interested in learning more about cybersecurity.
https://github.com/CyberSecurityUP/Awesome-Red-Team-Operations
The repository is organized into several categories, including reconnaissance and information gathering, exploitation, post-exploitation, and defense evasion. Each category contains links to various tools and resources that can be used in Red Team Operations.
Some of the tools and frameworks included in the repository are well-known and widely used, such as Metasploit, Cobalt Strike, and Empire. Other tools and frameworks are less well-known but still valuable for Red Team Operations, such as BloodHound, which is used for Active Directory reconnaissance, and GoPhish, which is used for phishing simulations.
In addition to tools and frameworks, the repository also includes links to blogs, articles, and other resources that provide guidance on conducting Red Team Operations and improving overall security posture. These resources cover a wide range of topics, including social engineering, network infrastructure, and application security.
Overall, the "Awesome-Red-Team-Operations" repository is a valuable resource for Red Teamers, defenders, and anyone interested in learning more about cybersecurity.
https://github.com/CyberSecurityUP/Awesome-Red-Team-Operations
GitHub
GitHub - CyberSecurityUP/Awesome-Red-Team-Operations
Contribute to CyberSecurityUP/Awesome-Red-Team-Operations development by creating an account on GitHub.
Forwarded from RED TEAM COLLECTIONS
Artificial Intelligence (
As we move towards the future, the importance of AI is only going to increase. The growth of AI has been exponential, especially in the fields of development and cybersecurity. There are new tools, techniques, and innovations being introduced every day, and it's important to keep up with the latest trends.
That's why we're excited to announce that we're hosting a discussion on the
topic "AI the Future" today from 9๏ธโฃ PM to 1๏ธโฃ0๏ธโฃ PM IST. During the discussion, we will be exploring different aspects of AI and its impact on the world. We invite everyone to participate, share their ideas, and discuss the latest tools, topics, and innovations related to AI.We hope that this discussion will be an opportunity for all of us to learn and explore something new. It's a chance to expand our knowledge and to stay up to date with the latest trends in the world of AI.
Don't forget to subscribe to us on Instagram to stay updated with our latest events and discussions.
Follow us at https://www.instagram.com/googledevlop/
Powered By @GDB_HackerOne
Please open Telegram to view this post
VIEW IN TELEGRAM
RED TEAM COLLECTIONS
To participate, join us at
https://t.me/+v4ic8auHhXRhYTA1
https://t.me/+v4ic8auHhXRhYTA1
Telegram
Info sec |โข| Red Team
In this group we will discuss about cyber sec
Our channel or group is not responsible for any type illegal activities
Our channel or group is not responsible for any type illegal activities
To ensure the security of this channel, the release of the Offsec Leak will be postponed to another channel.
https://t.me/+RaY74LwsK14wZTBl
You will receive the link to access the leak in that channel. We will leak the information on that channel, but please note that the link will expire in 24 hours.
https://t.me/+RaY74LwsK14wZTBl
You will receive the link to access the leak in that channel. We will leak the information on that channel, but please note that the link will expire in 24 hours.