GDB HackerOne
512 subscribers
40 photos
81 videos
153 files
138 links
Google Database (GDB) is a categorized index of Internet search engine queries designed information publicly available
Download Telegram
THM RT.zip
100.9 MB
#Leaked โšก๏ธ Red Teaming tryhackme ๐Ÿง‘โ€๐Ÿ’ป

Learn the skills needed to become a Red Team Operator

Use diverse techniques for initial access
Enumerate and persist on targets`
Evade security solutions
Exploit Active Directory

Level: Intermediate | 48 hours

@redteamcollection
โ”œโ”€โ”€โ”€1 Red Team Fundamentals
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Intro to C2_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Red Team Engagements_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Red Team Fundamentals_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Red Team OPSEC_files
โ”‚ โ””โ”€โ”€โ”€TryHackMe _ Red Team Threat Intel_files
โ”œโ”€โ”€โ”€2 Initial Access
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Password Attacks_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Phishing_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Red Team Recon_files
โ”‚ โ””โ”€โ”€โ”€TryHackMe _ Weaponization_files
โ”œโ”€โ”€โ”€3 Post Compromise
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Data Exfiltration_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Enumeration_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Lateral Movement and Pivoting_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ The Lay of the land_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Windows Local Persistence_files
โ”‚ โ””โ”€โ”€โ”€TryHackMe _ Windows Privilege Escalation_files
โ”œโ”€โ”€โ”€4 Host Evasions
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Abusing Windows Internals_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ AV Evasion_ Shellcode_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Bypassing UAC_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Evading Logging and Monitoring_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Introduction to Antivirus_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Introduction to Windows API_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Living Off the Land_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Obfuscation Principles_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Runtime Detection Evasion_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Signature Evasion_files
โ”‚ โ””โ”€โ”€โ”€TryHackMe _ Windows Internals_files
โ”œโ”€โ”€โ”€5 Network Scurity Evasion
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Firewalls_files
โ”‚ โ”œโ”€โ”€โ”€TryHackMe _ Network Security Solutions_files
โ”‚ โ””โ”€โ”€โ”€TryHackMe _ Sandbox Evasion_files
โ””โ”€โ”€โ”€6 Compromising AD
โ”œโ”€โ”€โ”€TryHackMe _ Active Directory Basics_files
โ”œโ”€โ”€โ”€TryHackMe _ Breaching Active Directory_files
โ”œโ”€โ”€โ”€TryHackMe _ Credentials Harvesting_files
โ”œโ”€โ”€โ”€TryHackMe _ Enumerating Active Directory_files
โ”œโ”€โ”€โ”€TryHackMe _ Exploiting Active Directory_files
โ”œโ”€โ”€โ”€TryHackMe _ Lateral Movement and Pivoting_files
โ””โ”€โ”€โ”€TryHackMe _ Persisting Active Directory_files
XRY Reader to XAMN Viewer transition course

Module 1:
https://bit.ly/2tgjipU

Module 2:
https://bit.ly/2DBrHJc

Module 3:
https://bit.ly/2RSAmfH

Module 4:
https://bit.ly/2N0uZu0

password for the course is โ€œxamnviewerโ€
CELLEBRITE AND MSAB

Cellebrite magnet link:
magnet:?xt=urn:btih:f881291ab69fff48393ede2e36a4f8fcb4b5bf7a&dn=cellebrite&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A6969%2Fannounce&tr=https%3A%2F%2Fopentracker.i2p.rocks%3A443%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce

MSAB download link:
magnet:?xt=urn:btih:0e7d11a34f71887aca3a388795e0b019cca44858&dn=msab.tar.zst&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A6969%2Fannounce&tr=https%3A%2F%2Fopentracker.i2p.rocks%3A443%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce
โœจ
          ๐Ÿงต๐ŸŸง๐ŸŸง๐ŸŸง๐ŸŸง๐ŸŸง
          ๐Ÿงตโฌœ๏ธโฌœ๏ธ๐Ÿ”ตโฌœโฌœ
          ๐Ÿงต๐ŸŸฉ๐ŸŸฉ๐ŸŸฉ๐ŸŸฉ๐ŸŸฉ
          ๐Ÿงต      ๐ŸŒฟ      
          ๐Ÿงต            ๐ŸŒบ
          ๐Ÿงต     ๐ŸŒฑ        ๐ŸŒธ
          ๐Ÿงต ๐Ÿ’
          ๐Ÿงต         ๐Ÿƒ       ๐Ÿ€
          ๐Ÿงต
          ๐Ÿงต      ๐Ÿ         ๐ŸŒบ
          ๐Ÿงต
          ๐Ÿงต๐Ÿ‚       ๐Ÿƒ    ๐Ÿ‚
          ๐Ÿงต                    ๐ŸŒบ
          ๐Ÿงต     ๐ŸŒธ         
     ๐Ÿ›‘๐Ÿ›‘๐Ÿ›‘
  ๐Ÿ›‘๐Ÿ›‘๐Ÿ›‘๐Ÿ›‘
๐Ÿ›‘๐Ÿ›‘๐Ÿ›‘๐Ÿ›‘๐Ÿ›‘

โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰
๐ŸคŽ  โƒŸ๐Ÿ‡ฎ๐Ÿ‡ณโ˜†โ‹†โ˜†๐ŸคŽ  โƒŸ๐Ÿ‡ฎ๐Ÿ‡ณโ˜†โ‰›โ˜†๐ŸคŽ โƒŸ๐Ÿ‡ฎ๐Ÿ‡ณ
โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰


HAPPY  REPUBLIC  DAY ๐ŸŽ ๐Ÿ

โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰
๐ŸคŽ  โƒŸ๐Ÿ‡ฎ๐Ÿ‡ณโ˜†โ‰›โ˜†๐ŸคŽ  โƒŸ๐Ÿ‡ฎ๐Ÿ‡ณโ˜†โ‹†โ˜†๐ŸคŽ โƒŸ๐Ÿ‡ฎ๐Ÿ‡ณ
โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰โ—‰

๐Ÿ’ฅ๐™…๐™–๐™ฎ ๐™ƒ๐™ž๐™ฃ๐™™ ๐™…๐™–๐™ฎ ๐˜ฝ๐™๐™–๐™ง๐™–๐™ฉ๐Ÿ’ฅ

๐Ÿ‡ฎ๐Ÿ‡ณ๐‡๐€๐๐๐˜ 74๐ญ๐ก ๐‘๐„๐๐”๐๐‹๐ˆ๐‚ ๐ƒ๐€๐˜
QRLJacker

QRLJacker is a highly customizable exploitation framework to hijack services that depend on QR Code as an authentication and login method

OWASP's links reference
https://www.owasp.org/index.php/QRLJacking

https://www.owasp.org/index.php/OWASP_QRLJacker

If you want to write your own module
Read here
โ™‚๏ธ Github repositories every Developer should know โ™‚๏ธ


โ—๏ธA very popular repo that curates all topics from Development, testing, business, etc, etc.

https://github.com/sindresorhus/awesome


โ—๏ธClean Code JavaScript

https://github.com/ryanmcdermott/clean-code-javascript


โ—๏ธTech Interview Handbook

https://github.com/yangshun/tech-interview-handbook


โ—๏ธDeveloper Roadmaps, articles and resources for developers.

https://github.com/kamranahmedse/developer-roadmap


โ—๏ธ33 JS Concepts

https://github.com/leonardomso/33-js-concepts


โ—๏ธBest websites a programmer should visit

https://github.com/sdmg15/Best-websites-a-programmer-should-visit


โ—๏ธDesign Resources for Developers

https://github.com/bradtraversy/design-resources-for-developers


โ—๏ธBig List of Naughty Strings:

https://github.com/minimaxir/big-list-of-naughty-strings
The repository includes links to various tools, frameworks, and resources that can be used by Red Teamers to conduct attacks, as well as resources for defenders to improve their security posture.

The repository is organized into several categories, including reconnaissance and information gathering, exploitation, post-exploitation, and defense evasion. Each category contains links to various tools and resources that can be used in Red Team Operations.

Some of the tools and frameworks included in the repository are well-known and widely used, such as Metasploit, Cobalt Strike, and Empire. Other tools and frameworks are less well-known but still valuable for Red Team Operations, such as BloodHound, which is used for Active Directory reconnaissance, and GoPhish, which is used for phishing simulations.

In addition to tools and frameworks, the repository also includes links to blogs, articles, and other resources that provide guidance on conducting Red Team Operations and improving overall security posture. These resources cover a wide range of topics, including social engineering, network infrastructure, and application security.

Overall, the "Awesome-Red-Team-Operations" repository is a valuable resource for Red Teamers, defenders, and anyone interested in learning more about cybersecurity.

https://github.com/CyberSecurityUP/Awesome-Red-Team-Operations
Forwarded from RED TEAM COLLECTIONS
โœ”๏ธ The First ๐Ÿ” ๐Ÿ”  On ๐Ÿ” ๐Ÿ” 

Artificial Intelligence (โ˜„๏ธ) has revolutionized the world in ways we never thought possible. From healthcare to education, from finance to transportation, AI has been making our lives easier and more efficient.

As we move towards the future, the importance of AI is only going to increase. The growth of AI has been exponential, especially in the fields of development and cybersecurity. There are new tools, techniques, and innovations being introduced every day, and it's important to keep up with the latest trends.

That's why we're excited to announce that we're hosting a discussion on the topic "AI the Future" today from 9๏ธโƒฃ PM to 1๏ธโƒฃ0๏ธโƒฃ PM IST. During the discussion, we will be exploring different aspects of AI and its impact on the world. We invite everyone to participate, share their ideas, and discuss the latest tools, topics, and innovations related to AI.

We hope that this discussion will be an opportunity for all of us to learn and explore something new. It's a chance to expand our knowledge and to stay up to date with the latest trends in the world of AI.

Don't forget to subscribe to us on Instagram to stay updated with our latest events and discussions.
Follow us at https://www.instagram.com/googledevlop/
Powered By @GDB_HackerOne ๐Ÿคซ

๐Ÿ“Š Let's explore the world of AI together and shape the future. ๐Ÿ’ฒ
Please open Telegram to view this post
VIEW IN TELEGRAM
To ensure the security of this channel, the release of the Offsec Leak will be postponed to another channel.
https://t.me/+RaY74LwsK14wZTBl

You will receive the link to access the leak in that channel. We will leak the information on that channel, but please note that the link will expire in 24 hours.