😈 [ ntlmrelay, Ring3API ]
🐍 Python utility to generate #MITRE ATT&CK Vault for #Obsidian.
1️⃣Get Obsidian (https://t.co/ZBOCQ2ez7U)
2️⃣Generate Vault (https://t.co/3A5dbhoRC2)
3️⃣Explore!
#blueteam #threathunting #ThreatIntelligence
🔗 https://obsidian.md/
🔗 https://github.com/arch4ngel/sec-vault-gen
🐥 [ tweet ]
🐍 Python utility to generate #MITRE ATT&CK Vault for #Obsidian.
1️⃣Get Obsidian (https://t.co/ZBOCQ2ez7U)
2️⃣Generate Vault (https://t.co/3A5dbhoRC2)
3️⃣Explore!
#blueteam #threathunting #ThreatIntelligence
🔗 https://obsidian.md/
🔗 https://github.com/arch4ngel/sec-vault-gen
🐥 [ tweet ]
👍2
😈 [ ntlmrelay, Ring3API ]
📌Dismember tool by @liam_galvin - scan memory for secrets and more.
⚙️https://t.co/3anDqypiVb
#redteam #BlueTeam #threathunting #DFIR
🔗 https://github.com/liamg/dismember
🐥 [ tweet ]
📌Dismember tool by @liam_galvin - scan memory for secrets and more.
⚙️https://t.co/3anDqypiVb
#redteam #BlueTeam #threathunting #DFIR
🔗 https://github.com/liamg/dismember
🐥 [ tweet ]
😈 [ ntlmrelay, Ring3API ]
📌How Does Windows Execute Shortcuts (.LNK)? - by @LabsSentinel
➡️https://t.co/azJmSz7A5T
#BlueTeam #ThreatHunting #DFIR
🔗 https://www.sentinelone.com/labs/who-needs-macros-threat-actors-pivot-to-abusing-explorer-and-other-lolbins-via-windows-shortcuts/
🐥 [ tweet ]
📌How Does Windows Execute Shortcuts (.LNK)? - by @LabsSentinel
➡️https://t.co/azJmSz7A5T
#BlueTeam #ThreatHunting #DFIR
🔗 https://www.sentinelone.com/labs/who-needs-macros-threat-actors-pivot-to-abusing-explorer-and-other-lolbins-via-windows-shortcuts/
🐥 [ tweet ]
😈 [ c2_matrix, C2 Matrix | #C2Matrix ]
Excellent post on understanding how Sliver C2 works from both attack and defense perspective. Dare we say... #purpleteam #C2Matrix #redteam #blueteam
https://t.co/HfAgxwrv6C
🔗 https://www.cybereason.com/blog/sliver-c2-leveraged-by-many-threat-actors
🐥 [ tweet ]
Excellent post on understanding how Sliver C2 works from both attack and defense perspective. Dare we say... #purpleteam #C2Matrix #redteam #blueteam
https://t.co/HfAgxwrv6C
🔗 https://www.cybereason.com/blog/sliver-c2-leveraged-by-many-threat-actors
🐥 [ tweet ]
😈 [ ZephrFish, Andy ]
Great post from @_RayRT on abusing different Active Directory object controls and how to detect them https://t.co/CFQvEuA0Rv #RedTeam #blueteam #purpleteam #cti
🔗 http://labs.lares.com/securing-active-directory-via-acls/
🐥 [ tweet ]
Great post from @_RayRT on abusing different Active Directory object controls and how to detect them https://t.co/CFQvEuA0Rv #RedTeam #blueteam #purpleteam #cti
🔗 http://labs.lares.com/securing-active-directory-via-acls/
🐥 [ tweet ]
👍6