@darnell @GreenFire @Runyan50
🇳🇫 has done nothing but work for ☮. It has never waged war against anybody. War with 🇨🇳 would be 100% China's fault, and any acts against them would only be . Just stop it with your wild imagination! 😡

#defensive #China #Peace #Taiwan

Last updated 2 years ago

nadin brzezinski · @Nadinabbott
1966 followers · 4818 posts · Server mstdn.social
WordofTheHour · @wordofthehour
2265 followers · 35503 posts · Server botsin.space

: serving to defend or protect

- French: défensif

- Italian: difensivo

- Portuguese: defenssivo

- Spanish: defensivo

------------

Join our new Discord Server for language learners @ wordofthehour.org/discord

#defensive

Last updated 2 years ago

acemaxx · @acemaxxanalytics
180 followers · 1795 posts · Server econtwitter.net

Money managers are shying away from risk, turning to stocks and UST in their hunt for safe places to invest their cash. Yet they appear equally worried about missing out on a potential stock-market rally, chart @WJSecon cutt.ly/j6rZthd

#defensive

Last updated 2 years ago

null - Open Security Community · @null0x00
156 followers · 412 posts · Server ioc.exchange

RT @NullBhubaneswar
Final talk of the day is about to start. Please join us to experience defensive side of the security "Web Application Firewall Episode 2" By @sampad673
teams.live.com/meet/9532502088

#defensive #security #waf #nullBhubaneswar

Last updated 2 years ago

/ explores two similar in : Chûdan no kamae and Seigan no kamae. is a position, effective when stationary, while is safer for moving around. Both positions are beginner-friendly and provide a sense of safety, but their extended blades limit offensive capabilities and can make practitioners vulnerable to binds and displacements. Most use Chûdan while standing still and Seigan while moving.

#kenjutsuka #seigan #defensive #chudan #martialarts #guardstances #kenjutsu #battojutsu #inyoryu #shobukan

Last updated 2 years ago

All my Source Codes for & +
All in one ;D , here in this repository

[offensive] NativePayload_PE1
[offensive] NativePayload_ARP
[offensive] NativePayload_ARP2
[offensive] NativePayload_BSSID
[offensive] NativePayload_CBT
[offensive] NativePayload_DNS
[offensive] NativePayload_DNS2
[offensive] NativePayload_DynLCI
[offensive] NativePayload_HTTP
[offensive] NativePayload_ICMP
[offensive] NativePayload_IP6DNS
[offensive] NativePayload_Image
[offensive] NativePayload_MP
[offensive] NativePayload_ReverseShell
[offensive] NativePayload_Reverse_tcp
[offensive] NativePayload_TId
[offensive] NativePayload_TiACBT
[offensive] NativePayload_Tinjection
[defensive] BEV4
[defensive] ETWProcessMon2
[defensive] ETWNetMonv3
[defensive] MPD

github.com/DamonMohammadbagher

#redteaming #pentesting #blueteaming #offensive #defensive #csharp #code #opensource #learning

Last updated 2 years ago

Collection of Blue Team Codes & Tools which made by Offensive guys & Defensive guys
in this article i just want to share some very useful codes/tools which made by also some of them made by & for , all these codes/tools are available in my list in github but in this article i just show you Blue team Tools/Codes but in the list you can see Offensive codes/tools too and ...
full list link : github.com/DamonMohammadbagher


list last updated: 18 feb 2023
[defensive] @ZeroMemoryEx , (malware analysts to extract Command and Control C2 traffic) => github.com/ZeroMemoryEx/C2-Hun
[defensive] foxit , (detect use of the DanderSpritz eventlogedit module [recover the removed event log entries]) => github.com/fox-it/danderspritz
[defensive] thefLinkk , (Hunt-Sleeping-Beacons. Aims to identify sleeping beacons) => github.com/thefLink/Hunt-Sleep
[defensive] LOLBAS-Project, (LOLBAS project is to document every binary, script & library that can be used for Living Off The Land techniques) => github.com/LOLBAS-Project/LOLB
[defensive] @winternl_t , (syscall-detect) => github.com/jackullrich/syscall
[defensive] @slaeryan , (Detects Module Stomping as implemented by Cobalt Strike) => github.com/slaeryan/DetectCoba
[defensive] @_Apr4h , (CobaltStrikeScan, Scan files or process memory for CobaltStrike beacons) => github.com/Apr4h/CobaltStrikeS
[defensive] Siemens Healthineers , ETWAnalyzer (Command line tool to analyze one/many ETW file/s with simple queries) => github.com/Siemens-Healthineer
[defensive] KANKOSHEV , (Detect-HiddenThread-via-KPRCB, Detect removed thread from PspCidTable) => github.com/KANKOSHEV/Detect-Hi
[defensive] @Waldoirc , (Detect strange memory regions and DLLs ) => github.com/waldo-irc/MalMemDet
[defensive] Rabobank Cyber Defence Centre , (Detect Tactics, Techniques & Combat Threats) => github.com/rabobank-cdc/DeTTEC
[defensive] @jordanklepser , (defender-detectionhistory-parser, A parser of Windows Defender's DetectionHistory forensic artifact) => github.com/jklepsercyber/defen
[defensive] @ScarredMonk , (SysmonSimulator, Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs) => github.com/ScarredMonk/SysmonS
[defensive] Splunk , (Cmelting-cobalt, Cobalt Strike Scanner that retrieves detected Team Server beacons) => github.com/splunk/melting-coba
[defensive] Ali Davanian , (CnCHunter is a fork of RiotMan, and it allows exploiting malware for active probing) => github.com/adava/CnCHunter
[defensive] Airbus CERT , (Wireshark plugin to work with ETW) => github.com/airbus-cert/Winshar
[defensive] @_forrestorr , (Moneta, memory scanner) => github.com/forrest-orr/moneta
[defensive] @hasherezade , (Pe-Sieve, memory scanner) => github.com/hasherezade/pe-siev
[defensive] @arch_rabbit , (Fibratus is a tool for exploration and tracing of the Windows kernel) => github.com/rabbitstack/fibratu
[defensive] Rajiv Kulkarni , (FalconEye, Real-time detection software for Windows process injections) => github.com/rajiv2790/FalconEye
[defensive] @standa_t , (tool to help malware analysts tell that the sample is injecting code to another process) => github.com/tandasat/RemoteWrit
[defensive] Microsoft , (MSFT, CPU/Memory performance-analysis,very useful ETW Codes & tools for Blue Teams/Defenders) => github.com/microsoft/perfview
[defensive] HoShiMin , (Avanguard, The Win32 Anti-Intrusion Library) => github.com/HoShiMin/Avanguard
[defensive] Lares , (Pushes Sysmon Configs) => github.com/LaresLLC/SysmonConf
[defensive] Improsec A/S , (Identify the attack paths in BloodHound breaking your AD tiering) => github.com/improsec/ImproHound
[defensive] @pathtofile , (Easy ETW Tracing for Security Research) => github.com/pathtofile/Sealight
[defensive] @_lpvoid , (TiEtwAgent is ETW-based process injection detection) => github.com/xinbailu/TiEtwAgent
[defensive] ComodoSecurity , (OpenEDR is a free & open source platform EDR) => github.com/ComodoSecurity/open
[defensive] wazuh , (Wazuh is a free & open source platform EDR) => github.com/wazuh/wazuh
[defensive] @cyb3rops , (Raccine, A Simple Ransomware Protection) => github.com/Neo23x0/Raccine
[defensive] 3lp4tr0n , (BeaconHunter , Behavior based monitoring and hunting tool built in C# tool leveraging ETW tracing) => github.com/3lp4tr0n/BeaconHunt
[defensive] OpenCTI , (open source platform allowing organizations to manage their cyber threat intelligence knowledge) => github.com/OpenCTI-Platform/op
[defensive] ion-storm , (Sysmon EDR Active Response Features) => github.com/ion-storm/sysmon-ed
[defensive] @jtsmith282 , Blue teams monitor systems => github.com/ION28/BLUESPAWN
[defensive] @hasherezade , (hollows_hunter , memory scanner) => github.com/hasherezade/hollows
[off---def] Nomi Sec , (Hacker-Trends) => github.com/nomi-sec/Hacker-Tre
[off---def] @brsn76945860 , (Enumerating and removing kernel callbacks using signed vulnerable drivers) => github.com/br-sn/CheekyBlinder
[off---def] m0rv4i , (Syscalls-Extractor, extracting syscall numbers for an OS) => github.com/m0rv4i/Syscalls-Ext
[off---def] @ale_sp_brazil , (dotnet malware threat, internals & reversing) => blackstormsecurity.com/docs/AL
[off---def] @0gtweet , (Simple solutions allowing you to dig a bit deeper than usual) => github.com/gtworek/PSBits
[off---def] Mr.Un1k0d3r , (EDRs Hooked APIs + some useful EDRs info for during red team exercise) => github.com/Mr-Un1k0d3r/EDRs
[off---def] Roberto Rodriguez @Cyb3rWard0g , (Education/Training: Threat Hunter Playbook) => threathunterplaybook.com/intro
[off---def] @_EthicalChaos_ , (MiniHook, hooking native API calls ) => github.com/CCob/MinHook.NET
[off---def] Black Lantern Security, (writehat , Pentest reporting tool written in Python) => github.com/blacklanternsecurit
[off---def] mvelazc0 , (PurpleSharp) => github.com/mvelazc0/PurpleShar
[off---def] boh , (C# Tools) => github.com/boh/RedCsharp
[off---def] redcanaryco , (Red-Teaming) => github.com/redcanaryco/atomic-

#defenders #pentesters #redteamers #blueteams #blueteam #redteam #offensive #defensive #codes #tools #blueteamtools

Last updated 3 years ago

maintracht · @maintracht
56 followers · 36 posts · Server hessen.social

– die maximale Herausforderung

Dienstagabend, Flutlicht, Europapokal. Frankfurt. Während solche Gelegenheiten in der Vergangenheit wirkliche Ausnahmen waren, hat die glorreiche SGE heuer mit dem Gastspiel des SSC Neapel bereits das zehnte Heimspiel in Serie in einem europäischen Wettbewerb vor der Brust. Und - das kann m

maintracht.blog/2023/02/21/sge

-League

#sgenapoli #champions #mmv #Buta #defensive #Heimspiel #herausforderung #Neapel

Last updated 3 years ago

Some New / for Some / / and Added to the list:

Full List here => github.com/DamonMohammadbagher

1. [offensive] @trickster012 , (Rust Weaponization for Red Team Engagements) => lnkd.in/eWsKKFY9

2. [offensive] @trickster012 , (roof of concept of bypassing(unhooking) the hook of potential EDRs) => lnkd.in/eQwQr4sY

3. [offensive] Deep Instinct , (A POC for the new injection technique, abusing windows fork API to evade EDRs) => lnkd.in/eGP2haTc

4. [offensive] @daem0nc0re , (investigation of Windows process execution techniques [C#]) => lnkd.in/eeyFi5Xz

5. [offensive] @D1rkMtr , (Bypass Userland EDR hooks by Loading Reflective Ntdll in memory) => lnkd.in/eVTy8WvP

6. [defensive] @ZeroMemoryEx , (malware analysts to extract Command and Control C2 traffic) => lnkd.in/eGWGKWgQ

7. [offensive] lem0nSec , (CreateRemoteThread: how to pass multiple parameters to the remote thread function without shellcode) => lnkd.in/eQ6ssfhK

8. [offensive] QAX A-Team , (A tool mainly to erase specified records from Windows event logs) => lnkd.in/eywTbFzr

9. [offensive] 3gstudent , (Remove individual lines from Windows XML Event Log (EVTX) files) => lnkd.in/ebn4AdaH

10. [offensive] @hlldz , (Windows Event Log Killer) => lnkd.in/es7V6xHt

11. [defensive] @foxit , (detect use of the DanderSpritz eventlogedit module [recover the removed event log entries]) => lnkd.in/evWYwRXQ

12. [offensive] @Ceramicskate0 , (C# Tool to interact with MS Exchange based on MS docs) => lnkd.in/ehiAcM6Z

13. [offensive] @reveng007 , (implant will exfiltrate data via smtp and will read commands from C2 [Gmail] via imap protocol) => lnkd.in/eBiXyEtR

14. [offensive] @cyberwarfarelab , (VectoredSyscall) => lnkd.in/eps_aJ6Z

15. [offensive] fosstodon.org/@mttaggart , (Notion as a platform for offensive operations) => lnkd.in/eXvKFTwP

16. [offensive] @t3l3machus , (A Windows reverse shell payload generator) => lnkd.in/e-Ce2zii

17. [offensive] @idov31 , (Sandman is a NTP based backdoor for red team engagements in hardened networks) => lnkd.in/eWzsBdXD

Full List here => github.com/DamonMohammadbagher

#codes #researches #pentesters #redtemaers #blueteamers #securityresearchers #cybersecurity #offensivesecurity #securityresearch #defensive #redteam #blueteam #pentest

Last updated 3 years ago

Arthur Lutz (Zenika) · @arthurzenika
359 followers · 483 posts · Server pouet.chapril.org

Merci @CrowdSec pour le swag!

Un beau hoodie avec des lamas dessus.

À suivre : crowdsec.net/

#Firewall #defensive #collaborative #security

Last updated 3 years ago

Amanda Keramik · @keramikslu
92 followers · 316 posts · Server mindly.social

Have you heard of jewellery? Look good, yourself 😁

#defensive #protect #stluciapotter #pottery #pottersofmasto

Last updated 3 years ago

ExistentialToot · @ExistentialToot
5 followers · 99 posts · Server mastodon.world

Communicating with defensive and controlling people is an art form. You want to look out for everyone but sometimes you can only look out for yourself. Controlling people do not take well to empathetic care and see it as either intrusive or an insult to their perfection.

#controllingpeople #defensive

Last updated 3 years ago

WordofTheHour · @wordofthehour
2139 followers · 32577 posts · Server botsin.space

: serving to defend or protect

- French: défensif

- Italian: difensivo

- Portuguese: defenssivo

- Spanish: defensivo

------------

Join our new Discord Server for language learners @ wordofthehour.org/discord

#defensive

Last updated 3 years ago

pmroman · @pmroman
68 followers · 754 posts · Server home.social

@AlexanderVI @OlgaPatlyuk When I speak about security guarantees, I mean exactly that, the Nations providing the guarantee should use all means, including war, to protect the beneficiary, in this case . I have stated before my believe that we should provide Ukraine with all means, and , and that the of will improve our . Sorry the late reply, the flu got to me 🙂

#ukraine #military #defensive #offensive #defeat #russia #commonsecurity

Last updated 3 years ago


now i want to share something for red-teaming via "Chatgpt" or "YOUdotCOM" as Security Researcher you can see with very simple trick you can find very useful codes here "YOU.COM" which is useful for or , in this case i searched this "write server-side code in C# for/to get bytes over port 8080 and get context" or something like that , and i had this result by so with little bit changing code i made my very simple Sever-Side only with (50-60 lines server side code), as you can see with very simple code via "Chatgpt" or you-dot-com you can make your own simple C2 Server core codes (networking) or ...

New Video for New codes, this Project is more than 60 lines ;D

Video: Simple C2 server by C# , "Using Chat + AI for C2 Network Core codes and ... make this simple C2 server in [1 hour] with AI help"

#chatgpt #youdotcom #learning #blueteam #redteam #pentesting #securityresearch #defensive #ai #video #c2 #csharp #inmemory #pentest #pentester #redteamer

Last updated 3 years ago

Intro to Defensive Security - I have just completed this room! Check it out: tryhackme.com/room/defensivese security response intelligence analysis Operations Center via @RealTryHackMe

#tryhackme #security #defensive #incident #threat #malware #dfir #soc #siem #defensivesecurityhq

Last updated 3 years ago


in last post i talked about blue-teaming, now i want to share something for red-teaming via "Chatgpt" or "YOUdotCOM" as Security Researcher you can see with very simple trick you can find very useful codes here "YOU.COM" which is useful for or , in this case i searched this "write server-side code in C# for/to get bytes over port 8080 and get context" or something like that , and i had this result by so with little bit changing code i made my very simple Sever-Side C2 only with (50-60 lines server side code), as you can see with very simple code via "Chatgpt" or you-dot-com you can make your own simple C2 Server core codes (networking) or ... but in this case my code executed in server side but i can change that then instead server side my CMD will run in Client-side & vice versa ;D, so as / and this will help you a lot , also this will be useful for Cyber security Instructors to learn new things better/faster also teaching them better etc
i wrote this code only in 10 mins , because i created my own C2 server with some techniques like this in C# but my core code in background worked with Async Methods and this code almost is similar to my core codes in my own C2 which i created 2-3 months ago so i made this code very fast because i had experience for working with them, but probably for you, this will take time more than 10 mins ;), maybe not, anyway as you can see for learning cyber security things , these platforms are awesome so this one was simple Example for Red-teaming

#chatgpt #youdotcom #learning #blueteam #redteam #pentesting #securityresearch #defensive #ai #pentester #redteamer #penester #blueteamer

Last updated 3 years ago

ok , i want to share something for about " " or "" websites how much is good/helpful for you and how you can use them to make your own tools (very fast) but always as you will have your own so you need work hard on these things , i will create article about this but in this post i will show you with very basic steps you can make your own C# or C++ tools for [Remote thread injection Detection] as you can see in "you.com", my search for monitoring event-log [ ] via c# for two EID 8,25 (but you need process creation/network connection event ids too) and our search result have two codes which both have same result, so now with you can detect these event (king of real-time) also you need Memory scanner which my simple search result was something like this pic but i did not test that (for sure, is working or not) i had my own tools and C# codes ;D , ...

note : sometimes these codes in these AI platforms which made by others is better than your own old codes so you can replace them (for example for memory scanner i will test this simple code which seems is better and faster than some of part of my own codes ;D but should test in my LAB for sure..)

and finally you can see my own Blue-teaming "SysPM2Mon2.7.exe" tools (which background of code was something like these steps in these pictures but my memory scanner is "Pe-sieve.exe" + my own C# code for Memory scanner, i had 2 memory scanners in this tool ;D)
so as you can see As and i made my own Blue-teaming tools ( which is available in my github) so you can do same things with your own IDEA , but now with these "Chatgpt" , "YOU.COM" , ... websites you can make them faster and much better...
i will create an article about this but i am working on my things and research about my new ebook also some codes for ebook, so i am very busy to make article now but i will create that ;)

#blueteamers #chatgpt #youdotcom #ai #defensive #developer #bugs #sysmon #realtime #csharp #memoryscanner #pentester #securityresearcher #opensource #blueteam #redteam #pentesting #securityresearch

Last updated 3 years ago

PhoenixSerenity · @msquebanh
808 followers · 4342 posts · Server mastodon.sdf.org

How Asher, , his home turf - despite the in the way 😹 He isn't fond of any home or yard cats.

The noises these are making on opposite sides of window are funny🤣

youtu.be/wSrbQOtSSqI

#domesticsecuritycat #defends #window #invader #cats #catsofmastodon #catsofsdf #angrycat #talkingcats #felines #catcommunication #defensive #mycat

Last updated 3 years ago