BOF to perform stealthy LDAP queries over AD WS
CustomDpapi: Calling the undocumented DPAPI RPC interface directly, no more calling public CryptUnprotectData! https://github.com/EvilBytecode/CustomDpapi #redteam
Secure your cloud now โ https://cyberdudebivash.gumroad.com/l/hobkwf
DM or email: iambivash@cyberdudebivash.com
Read the full report & grab the tool now - https://cyberdudebivash-news.blogspot.com/2026/02/introducing-cyberdudebivash-cloud.html
#CloudSecurity #CSPM #Cybersecurity #CloudMisconfiguration #DevSecOps #AWS #Azure #GCP #CloudComputing #SecurityAutomation #PenetrationTesting #RedTeam #CyberSecIndia #CyberDudeBivash
CYBERDUDEBIVASHยฎ โ Beast Mode Activated
From spoofing to tunnelling: New Red Team networking techniques for initial access and evasion
๐๏ธ ๐ก๐ผ๐ฟ๐๐ต๐ฆ๐ฒ๐ฐ ๐ฎ๐ฌ๐ฎ๐ฒ ๐๐ผ๐ฟ๐บ๐ฎ๐๐ถ๐ผ๐ป๐/๐ง๐ฟ๐ฎ๐ถ๐ป๐ถ๐ป๐ด๐ (๐ญ/๐ญ๐ฎ) : "Red Team Training" ๐ฝ๐ฎ๐ฟ/๐ฏ๐ Charles F. Hamilton from CYPFER
๐
Dates: May 12 and 13 2025 (2 days)
๐ฏ Level: Medium
Description: "๐๐ฉ๐ฆ ๐ต๐ณ๐ข๐ช๐ฏ๐ช๐ฏ๐จ ๐ช๐ด ๐ฅ๐ช๐ท๐ช๐ฅ๐ฆ๐ฅ ๐ช๐ฏ๐ต๐ฐ ๐ง๐ช๐ท๐ฆ ๐ด๐ฆ๐ค๐ต๐ช๐ฐ๐ฏ๐ด: ๐๐ฏ๐ช๐ต๐ช๐ข๐ญ ๐๐ฐ๐ฐ๐ต๐ฉ๐ฐ๐ญ๐ฅ, ๐๐ข๐ช๐ฏ๐ช๐ฏ๐จ ๐๐ค๐ค๐ฆ๐ด๐ด, ๐๐ง๐ง๐ฆ๐ฏ๐ด๐ช๐ท๐ฆ ๐๐ฐ๐ฅ๐ช๐ฏ๐จ, ๐๐ฏ๐ต๐ฆ๐ณ๐ฏ๐ข๐ญ ๐๐ฆ๐ค๐ฐ๐ฏ๐ฏ๐ข๐ช๐ด๐ด๐ข๐ฏ๐ค๐ฆ, ๐ข๐ฏ๐ฅ ๐๐ข๐ต๐ฆ๐ณ๐ข๐ญ ๐๐ฐ๐ท๐ฆ๐ฎ๐ฆ๐ฏ๐ต. ๐๐ข๐ค๐ฉ ๐ด๐ฆ๐ค๐ต๐ช๐ฐ๐ฏ ๐ธ๐ช๐ญ๐ญ ๐ฃ๐ฆ ๐ค๐ฐ๐ท๐ฆ๐ณ๐ฆ๐ฅ ๐ช๐ฏ ๐ฅ๐ฆ๐ฑ๐ต๐ฉ, ๐ฑ๐ณ๐ฐ๐ท๐ช๐ฅ๐ช๐ฏ๐จ ๐ต๐ฆ๐ค๐ฉ๐ฏ๐ช๐ค๐ข๐ญ ๐ฆ๐ท๐ช๐ฅ๐ฆ๐ฏ๐ค๐ฆ ๐ฐ๐ง ๐ฉ๐ฐ๐ธ ๐ฆ๐ข๐ค๐ฉ ๐ต๐ฆ๐ค๐ฉ๐ฏ๐ช๐ฒ๐ถ๐ฆ ๐ธ๐ฐ๐ณ๐ฌ๐ด ๐ฃ๐ฆ๐ฉ๐ช๐ฏ๐ฅ ๐ต๐ฉ๐ฆ ๐ด๐ค๐ฆ๐ฏ๐ฆ๐ด. ๐๐ฆ๐ฅ ๐ต๐ฆ๐ข๐ฎ ๐ฆ๐น๐ฆ๐ณ๐ค๐ช๐ด๐ฆ๐ด ๐ธ๐ช๐ญ๐ญ ๐ฃ๐ฆ ๐ฑ๐ฆ๐ณ๐ง๐ฐ๐ณ๐ฎ๐ฆ๐ฅ ๐ต๐ฐ ๐ข๐ด๐ด๐ฆ๐ด๐ด ๐ณ๐ฆ๐ด๐ฑ๐ฐ๐ฏ๐ด๐ช๐ท๐ฆ๐ฏ๐ฆ๐ด๐ด ๐ข๐ฏ๐ฅ ๐ฅ๐ฆ๐ต๐ฆ๐ค๐ต๐ช๐ฐ๐ฏ ๐ค๐ข๐ฑ๐ข๐ฃ๐ช๐ญ๐ช๐ต๐ช๐ฆ๐ด. ๐๐ด ๐ข ๐ณ๐ฆ๐ฅ ๐ต๐ฆ๐ข๐ฎ๐ฆ๐ณ, ๐ช๐ต ๐ช๐ด ๐ช๐ฎ๐ฑ๐ฐ๐ณ๐ต๐ข๐ฏ๐ต ๐ต๐ฐ ๐ถ๐ฏ๐ฅ๐ฆ๐ณ๐ด๐ต๐ข๐ฏ๐ฅ ๐ธ๐ฉ๐ข๐ต ๐ฆ๐ข๐ค๐ฉ ๐ต๐ฐ๐ฐ๐ญ ๐ข๐ฏ๐ฅ ๐ค๐ฐ๐ฎ๐ฎ๐ข๐ฏ๐ฅ ๐บ๐ฐ๐ถ ๐ถ๐ด๐ฆ ๐ช๐ด ๐ฅ๐ฐ๐ช๐ฏ๐จ ๐ฃ๐ฆ๐ฉ๐ช๐ฏ๐ฅ ๐ต๐ฉ๐ฆ ๐ด๐ค๐ฆ๐ฏ๐ฆ๐ด ๐ต๐ฐ ๐ฑ๐ณ๐ฐ๐ท๐ช๐ฅ๐ฆ ๐ฑ๐ณ๐ฐ๐ฑ๐ฆ๐ณ ๐จ๐ถ๐ช๐ฅ๐ข๐ฏ๐ค๐ฆ. ๐๐น๐ฑ๐ฆ๐ค๐ต ๐ต๐ฐ ๐ฑ๐ฆ๐ณ๐ง๐ฐ๐ณ๐ฎ ๐ค๐ฐ๐ฅ๐ฆ ๐ณ๐ฆ๐ท๐ช๐ฆ๐ธ๐ด, ๐ฏ๐ฆ๐ต๐ธ๐ฐ๐ณ๐ฌ ๐ข๐ฏ๐ข๐ญ๐บ๐ด๐ช๐ด, ๐ค๐ฐ๐ฅ๐ฆ ๐ฃ๐ฆ๐ฉ๐ข๐ท๐ช๐ฐ๐ณ ๐ข๐ฏ๐ข๐ญ๐บ๐ด๐ช๐ด, ๐ข๐ฏ๐ฅ ๐ธ๐ณ๐ช๐ต๐ฆ ๐ค๐ฐ๐ฅ๐ฆ ๐ต๐ฐ ๐ฆ๐ฏ๐ฉ๐ข๐ฏ๐ค๐ฆ ๐บ๐ฐ๐ถ๐ณ ๐ณ๐ฆ๐ฅ ๐ต๐ฆ๐ข๐ฎ ๐ค๐ข๐ฑ๐ข๐ฃ๐ช๐ญ๐ช๐ต๐ช๐ฆ๐ด."
About the trainer:
Charles F. Hamilton (Mr.Un1k0d3r) - Red Teamer with 10+ years experience delivering offensive testing services. Founder of RingZer0 Team website with 50,000+ members worldwide teaching hacking fundamentals. Prolific toolsmith and trainer who has delivered this training 20+ times. Specializes in covert Red Team operations in highly secured environments.
๐ Get your ticket now to benefit from this world-class training: https://nsec.io/training-sessions/
#NorthSec #cybersecurity #infosec #redteam #activedirectory #EDR
An open-source port/reimplementation of the Cobalt Strike BOF Loader https://github.com/CodeXTF2/Cobaltstrike_BOFLoader #redteam
An interesting Clickfix attack vector
https://expel.com/blog/clearfake-new-lotl-techniques
The Lolbas technique has been known for some time
https://lolbas-project.github.io/lolbas/Scripts/Syncappvpublishingserver/
Indirect Syscall with Acheron in Golang (Bypass Windows Defender on Windows 11)
@BrideOfLinux THIS is why one has explicit comms prepared to get released immediately.
#RedTeam #RedTeaming #Pentesting #PhysicalSecurity #Itsec #InfoSec #OpSec #ComSec
Just stumbled upon Phishing Club, looks like a decent successor to Gophish!
https://github.com/phishingclub/phishingclub
#phishing #redteam
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Microsoft SharePoint Document.
https://github.com/looCiprian/GC2-sheet
#infosec #cybersecurity #redteam #pentest #threatintel #dfir
TaskHound hunts privileged Windows scheduled tasks and exports them for BloodHound attack path analysis.
๐จ TREVORspray 2.4 drops w/ TENANT ENUM!
Big thanks to Sprocket Security for uncovering the secret API โ details: https://sprocketsecurity.com/blog/tenant-enumeration-is-back
Update to the latest version with pipx upgrade trevorspray
Spray smarter, not harder. #RedTeam #InfoSec
This project maintains a list of binaries natively available in Proxmox VE that can be leveraged by adversaries during red team operations
Corrupting the Hive Mind: Persistence Through Forgotten Windows Internals
Before Vegas: The โRed Hackersโ Who Shaped Chinaโs Cyber Ecosystem:
#cybersecurity #redteam #informationsecurity #threathunting #exploitation #infosec