r/purpleteamsec bot's Avatar

r/purpleteamsec bot

@r-purpleteamsec.bsky.social

Mirrors r/purpleteamsec, "we believe that when Red and Blue teams unite, security becomes not just a goal but a shared journey." Unofficial. Operated by @tweedge.net, open source @ https://github.com/tweedge/xpost-reddit-to-fediverse

68 Followers  |  4 Following  |  422 Posts  |  Joined: 10.11.2024  |  1.5768

Latest posts by r-purpleteamsec.bsky.social on Bluesky

A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.

A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.

07.08.2025 07:24 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
BamboozlEDR: A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.

BamboozlEDR: A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.

07.08.2025 02:24 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
The Silent Exfiltration: Zero Click Agentic AI Hack That Can Leak Your Google Drive with One Email

The Silent Exfiltration: Zero Click Agentic AI Hack That Can Leak Your Google Drive with One Email

05.08.2025 22:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
DNS Proxy for C2 Servers

DNS Proxy for C2 Servers

05.08.2025 15:54 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Before ToolShell: Exploring Storm-2603’s Previous Ransomware Operations

Before ToolShell: Exploring Storm-2603’s Previous Ransomware Operations

05.08.2025 01:24 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
The Hidden Gaps in Entra ID Linkable Token Identifier

The Hidden Gaps in Entra ID Linkable Token Identifier

05.08.2025 01:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Attack Graph Model Design Requirements and Examples

Attack Graph Model Design Requirements and Examples

04.08.2025 18:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Lateral Movement - BitLocker

Lateral Movement - BitLocker

04.08.2025 16:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
GitHound - a BloodHound OpenGraph collector for GitHub, designed to map your organization’s structure and permissions into a navigable attack‑path graph

GitHound - a BloodHound OpenGraph collector for GitHub, designed to map your organization’s structure and permissions into a navigable attack‑path graph

04.08.2025 12:24 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Out-of-the-box CobaltStrike Beacon source code use C++

Out-of-the-box CobaltStrike Beacon source code use C++

04.08.2025 09:54 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Accelerating Offensive R&D with LLMs

Accelerating Offensive R&D with LLMs

02.08.2025 09:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
BloodHound v8: Usability, Extensibility, and OpenGraph

BloodHound v8: Usability, Extensibility, and OpenGraph

01.08.2025 18:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
RingReaper: Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.

RingReaper: Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.

01.08.2025 00:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Async BOFs - "Wake Me Up, Before You Go Go"

Async BOFs - "Wake Me Up, Before You Go Go"

31.07.2025 04:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
MSSQLHound: PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph

MSSQLHound: PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph

30.07.2025 03:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Hells-Hollow: Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls

Hells-Hollow: Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls

29.07.2025 22:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
SSDT Hooking via Alt Syscalls for ETW Evasion

SSDT Hooking via Alt Syscalls for ETW Evasion

29.07.2025 21:54 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
An ADCS honeypot to catch attackers in your internal network.

An ADCS honeypot to catch attackers in your internal network.

29.07.2025 00:54 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
DPAPI Backup Key Compromise Pt. 1: Some Forests Must Burn

DPAPI Backup Key Compromise Pt. 1: Some Forests Must Burn

28.07.2025 20:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
RAITrigger technique that abuses the RAiForceElevationPromptForCOM RPC function in appinfo.dll to trigger SYSTEM authentication to an arbitrary UNC path. This can be useful for relaying or ADCS attacks in domain environments

RAITrigger technique that abuses the RAiForceElevationPromptForCOM RPC function in appinfo.dll to trigger SYSTEM authentication to an arbitrary UNC path. This can be useful for relaying or ADCS attacks in domain environments

27.07.2025 23:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Detecting ADCS Privilege Escalation

Detecting ADCS Privilege Escalation

27.07.2025 20:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Monitor Cobalt Strike beacon for Windows tokens and gain Kerberos persistence

Monitor Cobalt Strike beacon for Windows tokens and gain Kerberos persistence

27.07.2025 12:24 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
The RPC-function RAiForceElevationPromptForCOM from the appinfo.dll library allows SYSTEM coercion. This only works on domain joined systems. This function can be called from any low privileged user to trigger SYSTEM authentication to an arbitrary location

The RPC-function RAiForceElevationPromptForCOM from the appinfo.dll library allows SYSTEM coercion. This only works on domain joined systems. This function can be called from any low privileged user to trigger SYSTEM authentication to an arbitrary location

27.07.2025 11:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike

A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike

26.07.2025 23:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Escaping the Confines of Port 445

Escaping the Confines of Port 445

26.07.2025 19:54 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Make Sure to Use SOAP(y) - An Operators Guide to Stealthy AD Collection Using ADWS

Make Sure to Use SOAP(y) - An Operators Guide to Stealthy AD Collection Using ADWS

25.07.2025 23:39 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
netescape: Malware traffic obfuscation library

netescape: Malware traffic obfuscation library

25.07.2025 07:54 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
An Analysis of a Malicious Solana Open-source Trading Bot

An Analysis of a Malicious Solana Open-source Trading Bot

25.07.2025 02:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
x86-64 GetPC: SYSCALL

x86-64 GetPC: SYSCALL

24.07.2025 04:54 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
LudusHound - a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment via Ludus for controlled testing

LudusHound - a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment via Ludus for controlled testing

23.07.2025 05:54 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@r-purpleteamsec is following 4 prominent accounts