@darnell @GreenFire @Runyan50
#Taiwan 🇳🇫 has done nothing but work for #peace ☮. It has never waged war against anybody. War with #China 🇨🇳 would be 100% China's fault, and any acts against them would only be #defensive. Just stop it with your wild imagination! 😡
#defensive #China #Peace #Taiwan
#Offensive, #defensive and #nuclear threats
https://nadinbrzezinski.medium.com/offensive-and-defensive-operations-be9de696438
#nuclear #defensive #offensive
#defensive : serving to defend or protect
- French: défensif
- Italian: difensivo
- Portuguese: defenssivo
- Spanish: defensivo
------------
Join our new Discord Server for language learners @ https://wordofthehour.org/discord
Money managers are shying away from risk, turning to #defensive stocks and UST in their hunt for safe places to invest their cash. Yet they appear equally worried about missing out on a potential stock-market rally, chart @WJSecon https://cutt.ly/j6rZthd
RT @NullBhubaneswar
Final talk of the day is about to start. Please join us to experience defensive side of the security "Web Application Firewall Episode 2" By @sampad673
https://teams.live.com/meet/9532502088104…@null0x00 #defensive #Security #WAF #nullbhubaneswar
#defensive #security #waf #nullBhubaneswar
#Shobukan #InyoRyu #Battojutsu / #Kenjutsu explores two similar #guardStances in #martialArts: Chûdan no kamae and Seigan no kamae. #Chudan is a #defensive position, effective when stationary, while #Seigan is safer for moving around. Both positions are beginner-friendly and provide a sense of safety, but their extended blades limit offensive capabilities and can make practitioners vulnerable to binds and displacements. Most #kenjutsuka use Chûdan while standing still and Seigan while moving.
#kenjutsuka #seigan #defensive #chudan #martialarts #guardstances #kenjutsu #battojutsu #inyoryu #shobukan
All my Source Codes for #redteaming & #pentesting + #blueteaming
All in one ;D , here in this repository
[offensive] NativePayload_PE1
[offensive] NativePayload_ARP
[offensive] NativePayload_ARP2
[offensive] NativePayload_BSSID
[offensive] NativePayload_CBT
[offensive] NativePayload_DNS
[offensive] NativePayload_DNS2
[offensive] NativePayload_DynLCI
[offensive] NativePayload_HTTP
[offensive] NativePayload_ICMP
[offensive] NativePayload_IP6DNS
[offensive] NativePayload_Image
[offensive] NativePayload_MP
[offensive] NativePayload_ReverseShell
[offensive] NativePayload_Reverse_tcp
[offensive] NativePayload_TId
[offensive] NativePayload_TiACBT
[offensive] NativePayload_Tinjection
[defensive] BEV4
[defensive] ETWProcessMon2
[defensive] ETWNetMonv3
[defensive] MPD
#redteaming #pentesting #blueteaming #offensive #defensive #csharp #code #opensource #learning
Collection of Blue Team Codes & Tools which made by Offensive guys & Defensive guys
in this article i just want to share some very useful codes/tools which made by #Defenders also some of them made by #Pentesters & #Redteamers for #Blueteams , all these codes/tools are available in my list in github but in this article i just show you Blue team Tools/Codes but in the list you can see Offensive codes/tools too and ...
full list link : https://github.com/DamonMohammadbagher/Some_Pentesters_SecurityResearchers_RedTeamers
#blueteam #redteam #offensive #defensive #pentesters #codes #tools #blueteamtools
list last updated: 18 feb 2023
[defensive] @ZeroMemoryEx , (malware analysts to extract Command and Control C2 traffic) => https://github.com/ZeroMemoryEx/C2-Hunter
[defensive] foxit , (detect use of the DanderSpritz eventlogedit module [recover the removed event log entries]) => https://github.com/fox-it/danderspritz-evtx
[defensive] thefLinkk , (Hunt-Sleeping-Beacons. Aims to identify sleeping beacons) => https://github.com/thefLink/Hunt-Sleeping-Beacons
[defensive] LOLBAS-Project, (LOLBAS project is to document every binary, script & library that can be used for Living Off The Land techniques) => https://github.com/LOLBAS-Project/LOLBAS
[defensive] @winternl_t , (syscall-detect) => https://github.com/jackullrich/syscall-detect
[defensive] @slaeryan , (Detects Module Stomping as implemented by Cobalt Strike) => https://github.com/slaeryan/DetectCobaltStomp
[defensive] @_Apr4h , (CobaltStrikeScan, Scan files or process memory for CobaltStrike beacons) => https://github.com/Apr4h/CobaltStrikeScan
[defensive] Siemens Healthineers , ETWAnalyzer (Command line tool to analyze one/many ETW file/s with simple queries) => https://github.com/Siemens-Healthineers/ETWAnalyzer
[defensive] KANKOSHEV , (Detect-HiddenThread-via-KPRCB, Detect removed thread from PspCidTable) => https://github.com/KANKOSHEV/Detect-HiddenThread-via-KPRCB
[defensive] @Waldoirc , (Detect strange memory regions and DLLs ) => https://github.com/waldo-irc/MalMemDetect
[defensive] Rabobank Cyber Defence Centre , (Detect Tactics, Techniques & Combat Threats) => https://github.com/rabobank-cdc/DeTTECT
[defensive] @jordanklepser , (defender-detectionhistory-parser, A parser of Windows Defender's DetectionHistory forensic artifact) => https://github.com/jklepsercyber/defender-detectionhistory-parser
[defensive] @ScarredMonk , (SysmonSimulator, Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs) => https://github.com/ScarredMonk/SysmonSimulator
[defensive] Splunk , (Cmelting-cobalt, Cobalt Strike Scanner that retrieves detected Team Server beacons) => https://github.com/splunk/melting-cobalt
[defensive] Ali Davanian , (CnCHunter is a fork of RiotMan, and it allows exploiting malware for active probing) => https://github.com/adava/CnCHunter
[defensive] Airbus CERT , (Wireshark plugin to work with ETW) => https://github.com/airbus-cert/Winshark
[defensive] @_forrestorr , (Moneta, memory scanner) => https://github.com/forrest-orr/moneta
[defensive] @hasherezade , (Pe-Sieve, memory scanner) => https://github.com/hasherezade/pe-sieve
[defensive] @arch_rabbit , (Fibratus is a tool for exploration and tracing of the Windows kernel) => https://github.com/rabbitstack/fibratus
[defensive] Rajiv Kulkarni , (FalconEye, Real-time detection software for Windows process injections) => https://github.com/rajiv2790/FalconEye
[defensive] @standa_t , (tool to help malware analysts tell that the sample is injecting code to another process) => https://github.com/tandasat/RemoteWriteMonitor
[defensive] Microsoft , (MSFT, CPU/Memory performance-analysis,very useful ETW Codes & tools for Blue Teams/Defenders) => https://github.com/microsoft/perfview
[defensive] HoShiMin , (Avanguard, The Win32 Anti-Intrusion Library) => https://github.com/HoShiMin/Avanguard
[defensive] Lares , (Pushes Sysmon Configs) => https://github.com/LaresLLC/SysmonConfigPusher
[defensive] Improsec A/S , (Identify the attack paths in BloodHound breaking your AD tiering) => https://github.com/improsec/ImproHound
[defensive] @pathtofile , (Easy ETW Tracing for Security Research) => https://github.com/pathtofile/Sealighter
[defensive] @_lpvoid , (TiEtwAgent is ETW-based process injection detection) => https://github.com/xinbailu/TiEtwAgent
[defensive] ComodoSecurity , (OpenEDR is a free & open source platform EDR) => https://github.com/ComodoSecurity/openedr
[defensive] wazuh , (Wazuh is a free & open source platform EDR) => https://github.com/wazuh/wazuh
[defensive] @cyb3rops , (Raccine, A Simple Ransomware Protection) => https://github.com/Neo23x0/Raccine
[defensive] 3lp4tr0n , (BeaconHunter , Behavior based monitoring and hunting tool built in C# tool leveraging ETW tracing) => https://github.com/3lp4tr0n/BeaconHunter
[defensive] OpenCTI , (open source platform allowing organizations to manage their cyber threat intelligence knowledge) => https://github.com/OpenCTI-Platform/opencti
[defensive] ion-storm , (Sysmon EDR Active Response Features) => https://github.com/ion-storm/sysmon-edr
[defensive] @jtsmith282 , Blue teams monitor systems => https://github.com/ION28/BLUESPAWN
[defensive] @hasherezade , (hollows_hunter , memory scanner) => https://github.com/hasherezade/hollows_hunter
[off---def] Nomi Sec , (Hacker-Trends) => https://github.com/nomi-sec/Hacker-Trends
[off---def] @brsn76945860 , (Enumerating and removing kernel callbacks using signed vulnerable drivers) => https://github.com/br-sn/CheekyBlinder
[off---def] m0rv4i , (Syscalls-Extractor, extracting syscall numbers for an OS) => https://github.com/m0rv4i/Syscalls-Extractor
[off---def] @ale_sp_brazil , (dotnet malware threat, internals & reversing) => http://www.blackstormsecurity.com/docs/ALEXANDREBORGES_DEFCON_2019.pdf
[off---def] @0gtweet , (Simple solutions allowing you to dig a bit deeper than usual) => https://github.com/gtworek/PSBits
[off---def] Mr.Un1k0d3r , (EDRs Hooked APIs + some useful EDRs info for during red team exercise) => https://github.com/Mr-Un1k0d3r/EDRs
[off---def] Roberto Rodriguez @Cyb3rWard0g , (Education/Training: Threat Hunter Playbook) => https://threathunterplaybook.com/introduction.html
[off---def] @_EthicalChaos_ , (MiniHook, hooking native API calls ) => https://github.com/CCob/MinHook.NET
[off---def] Black Lantern Security, (writehat , Pentest reporting tool written in Python) => https://github.com/blacklanternsecurity/writehat
[off---def] mvelazc0 , (PurpleSharp) => https://github.com/mvelazc0/PurpleSharp
[off---def] boh , (C# Tools) => https://github.com/boh/RedCsharp
[off---def] redcanaryco , (Red-Teaming) => https://github.com/redcanaryco/atomic-red-team
#defenders #pentesters #redteamers #blueteams #blueteam #redteam #offensive #defensive #codes #tools #blueteamtools
#SGENapoli – die maximale Herausforderung
Dienstagabend, Flutlicht, Europapokal. Frankfurt. Während solche Gelegenheiten in der Vergangenheit wirkliche Ausnahmen waren, hat die glorreiche SGE heuer mit dem Gastspiel des SSC Neapel bereits das zehnte Heimspiel in Serie in einem europäischen Wettbewerb vor der Brust. Und - das kann m
https://maintracht.blog/2023/02/21/sgenapoli-die-maximale-herausforderung/
#Champions-League #MMV #Buta #Defensive #Heimspiel #Herausforderung #Neapel
#sgenapoli #champions #mmv #Buta #defensive #Heimspiel #herausforderung #Neapel
Some New #codes / #researches for Some #Pentesters / #RedTemaers / #BlueTeamers and #securityresearchers Added to the list:
#cybersecurity #offensivesecurity #securityresearch #defensive #redteam #blueteam #pentest
Full List here => https://github.com/DamonMohammadbagher/Some_Pentesters_SecurityResearchers_RedTeamers
1. [offensive] @trickster012 , (Rust Weaponization for Red Team Engagements) => https://lnkd.in/eWsKKFY9
2. [offensive] @trickster012 , (roof of concept of bypassing(unhooking) the hook of potential EDRs) => https://lnkd.in/eQwQr4sY
3. [offensive] Deep Instinct , (A POC for the new injection technique, abusing windows fork API to evade EDRs) => https://lnkd.in/eGP2haTc
4. [offensive] @daem0nc0re , (investigation of Windows process execution techniques [C#]) => https://lnkd.in/eeyFi5Xz
5. [offensive] @D1rkMtr , (Bypass Userland EDR hooks by Loading Reflective Ntdll in memory) => https://lnkd.in/eVTy8WvP
6. [defensive] @ZeroMemoryEx , (malware analysts to extract Command and Control C2 traffic) => https://lnkd.in/eGWGKWgQ
7. [offensive] lem0nSec , (CreateRemoteThread: how to pass multiple parameters to the remote thread function without shellcode) => https://lnkd.in/eQ6ssfhK
8. [offensive] QAX A-Team , (A tool mainly to erase specified records from Windows event logs) => https://lnkd.in/eywTbFzr
9. [offensive] 3gstudent , (Remove individual lines from Windows XML Event Log (EVTX) files) => https://lnkd.in/ebn4AdaH
10. [offensive] @hlldz , (Windows Event Log Killer) => https://lnkd.in/es7V6xHt
11. [defensive] @foxit , (detect use of the DanderSpritz eventlogedit module [recover the removed event log entries]) => https://lnkd.in/evWYwRXQ
12. [offensive] @Ceramicskate0 , (C# Tool to interact with MS Exchange based on MS docs) => https://lnkd.in/ehiAcM6Z
13. [offensive] @reveng007 , (implant will exfiltrate data via smtp and will read commands from C2 [Gmail] via imap protocol) => https://lnkd.in/eBiXyEtR
14. [offensive] @cyberwarfarelab , (VectoredSyscall) => https://lnkd.in/eps_aJ6Z
15. [offensive] fosstodon.org/@mttaggart , (Notion as a platform for offensive operations) => https://lnkd.in/eXvKFTwP
16. [offensive] @t3l3machus , (A Windows reverse shell payload generator) => https://lnkd.in/e-Ce2zii
17. [offensive] @idov31 , (Sandman is a NTP based backdoor for red team engagements in hardened networks) => https://lnkd.in/eWzsBdXD
Full List here => https://github.com/DamonMohammadbagher/Some_Pentesters_SecurityResearchers_RedTeamers
#codes #researches #pentesters #redtemaers #blueteamers #securityresearchers #cybersecurity #offensivesecurity #securityresearch #defensive #redteam #blueteam #pentest
Merci @CrowdSec pour le swag!
Un beau hoodie avec des lamas dessus.
À suivre : https://www.crowdsec.net/
#Firewall #defensive #collaborative #security
Have you heard of #defensive jewellery? Look good, #protect yourself 😁 #stluciapotter #pottery #pottersofMasto
#defensive #protect #stluciapotter #pottery #pottersofmasto
Communicating with defensive and controlling people is an art form. You want to look out for everyone but sometimes you can only look out for yourself. Controlling people do not take well to empathetic care and see it as either intrusive or an insult to their perfection. #controllingpeople #defensive
#defensive : serving to defend or protect
- French: défensif
- Italian: difensivo
- Portuguese: defenssivo
- Spanish: defensivo
------------
Join our new Discord Server for language learners @ https://wordofthehour.org/discord
@AlexanderVI @OlgaPatlyuk When I speak about security guarantees, I mean exactly that, the Nations providing the guarantee should use all means, including war, to protect the beneficiary, in this case #Ukraine. I have stated before my believe that we should provide Ukraine with all #Military means, #Defensive and #Offensive, and that the #Defeat of #Russia will improve our #CommonSecurity. Sorry the late reply, the flu got to me 🙂
#ukraine #military #defensive #offensive #defeat #russia #commonsecurity
#chatgpt #youdotcom #learning #blueteam #redteam #pentesting #securityresearch #defensive #ai #video #c2 #csharp #inmemory #redteam #pentest
now i want to share something for red-teaming via "Chatgpt" or "YOUdotCOM" as Security Researcher you can see with very simple trick you can find very useful codes here "YOU.COM" which is useful for #pentester or #redteamer , in this case i searched this "write server-side code in C# for/to get bytes over port 8080 and get context" or something like that , and i had this result by #AI so with little bit changing code i made my very simple Sever-Side #C2 only with (50-60 lines server side code), as you can see with very simple code via "Chatgpt" or you-dot-com you can make your own simple C2 Server core codes (networking) or ...
New Video for New codes, this Project is more than 60 lines ;D
Video: Simple C2 server by C# , "Using Chat + AI for C2 Network Core codes and ... make this simple C2 server in [1 hour] with AI help"
#chatgpt #youdotcom #learning #blueteam #redteam #pentesting #securityresearch #defensive #ai #video #c2 #csharp #inmemory #pentest #pentester #redteamer
Intro to Defensive Security - I have just completed this room! Check it out: https://tryhackme.com/room/defensivesecurityhq #tryhackme #security #defensive security #incident response #threat intelligence #malware analysis #DFIR #SOC #SIEM #Security Operations Center #defensivesecurityhq via @RealTryHackMe
#tryhackme #security #defensive #incident #threat #malware #dfir #soc #siem #defensivesecurityhq
#chatgpt #youdotcom #learning #blueteam #redteam #pentesting #securityresearch #defensive #ai
in last post i talked about blue-teaming, now i want to share something for red-teaming via "Chatgpt" or "YOUdotCOM" as Security Researcher you can see with very simple trick you can find very useful codes here "YOU.COM" which is useful for #pentester or #redteamer , in this case i searched this "write server-side code in C# for/to get bytes over port 8080 and get context" or something like that , and i had this result by #AI so with little bit changing code i made my very simple Sever-Side C2 only with (50-60 lines server side code), as you can see with very simple code via "Chatgpt" or you-dot-com you can make your own simple C2 Server core codes (networking) or ... but in this case my code executed in server side but i can change that then instead server side my CMD will run in Client-side & vice versa ;D, so as #Penester / #Redteamer and #blueteamer this will help you a lot , also this will be useful for Cyber security Instructors to learn new things better/faster also teaching them better etc
i wrote this code only in 10 mins , because i created my own C2 server with some techniques like this in C# but my core code in background worked with Async Methods and this code almost is similar to my core codes in my own C2 which i created 2-3 months ago so i made this code very fast because i had experience for working with them, but probably for you, this will take time more than 10 mins ;), maybe not, anyway as you can see for learning cyber security things , these platforms are awesome so this one was simple Example for Red-teaming
#chatgpt #youdotcom #learning #blueteam #redteam #pentesting #securityresearch #defensive #ai #pentester #redteamer #penester #blueteamer
ok , i want to share something for #Blueteamers about "#chatgpt " or "#Youdotcom" #ai websites how much is good/helpful for you and how you can use them to make your own #defensive tools (very fast) but always as #developer you will have your own #bugs so you need work hard on these things , i will create article about this but in this post i will show you with very basic steps you can make your own C# or C++ tools for [Remote thread injection Detection] as you can see in "you.com", my search for monitoring #sysmon event-log [#realtime ] via c# for two EID 8,25 (but you need process creation/network connection event ids too) and our search result have two codes which both have same result, so now with #csharp you can detect these event (king of real-time) also you need Memory scanner which my simple search result was something like this pic but i did not test that (for sure, is working or not) i had my own #memoryscanner tools and C# codes ;D , ...
note : sometimes these codes in these AI platforms which made by others is better than your own old codes so you can replace them (for example for memory scanner i will test this simple code which seems is better and faster than some of part of my own codes ;D but should test in my LAB for sure..)
and finally you can see my own Blue-teaming "SysPM2Mon2.7.exe" tools (which background of code was something like these steps in these pictures but my memory scanner is "Pe-sieve.exe" + my own C# code for Memory scanner, i had 2 memory scanners in this tool ;D)
so as you can see As #Pentester and #SecurityResearcher i made my own Blue-teaming tools (#opensource which is available in my github) so you can do same things with your own IDEA , but now with these #ai "Chatgpt" , "YOU.COM" , ... websites you can make them faster and much better...
i will create an article about this but i am working on my things and research about my new ebook also some codes for ebook, so i am very busy to make article now but i will create that ;)
#blueteam #redteam #pentesting #securityresearch #defensive #ai #chatgpt #youdotcom
#blueteamers #chatgpt #youdotcom #ai #defensive #developer #bugs #sysmon #realtime #csharp #memoryscanner #pentester #securityresearcher #opensource #blueteam #redteam #pentesting #securityresearch
How Asher, #DomesticSecurityCat , #defends his home turf - despite the #window in the way 😹 He isn't fond of any home or yard #invader cats.
The noises these #cats are making on opposite sides of window are funny🤣
#CatsOfMastodon #CatsOfSDF #AngryCat #TalkingCats #Felines #CatCommunication #Defensive #MyCat
#domesticsecuritycat #defends #window #invader #cats #catsofmastodon #catsofsdf #angrycat #talkingcats #felines #catcommunication #defensive #mycat