#blueteam search results
KslKatzBOF A Beacon Object File (BOF) in-line LSASS credential extraction using the KslD.sys BYOVD technique github.com/PrincipleCheck… #redteam #pentesting #blueteam
UnderlayCopy_bof BOF for Havoc that copies locked Windows files (SAM, SYSTEM, NTDS.dit) via raw MFT parsing. No VSS, no Registry APIs, no PowerShell github.com/Muz1K1zuM/Unde… #blueteam #redteam #dfir
An interesting piece of research on stopping arbitrary ETW traces using an undocumented “Stop Trace” flag originhq.com/blog/securityt… #ThreatHunting #blueteam #redteam #pentesting
For those of you interested in digital forensics, Part 3 of our Registry Forensics series is now out. Here we cover evidence of execution hackers-arise.com/digital-forens… @three_cube @_aircorridor @DI0256 #forensics #cybersecurity #blueteam
Remote DLL Injection with Timer-based Shellcode Execution Using classic DLL injection with CreateThreadpoolTimer to run shellcode in-memory using legit system threads. A tool by Andrea Bocchetti (andreisss) Source: github.com/andreisss/Remo… #redteam #blueteam #maldev
These polls are a snapshot in time. Yes, as a Dem I find them encouraging, but I'll keep working working working to elect #BlueTeam Members.
🚨SHOCK POLL: Jon Ossoff leads by a whopping 7% in the Georgia's US Senate election. He won his first term in 2021 by just 1.2%. Georgia - 2026 US Senate 🟦Jon Ossoff* 51% (+7) 🟥Mike Collins 44% Echelon Insights | April 3-9, 2026 | 407 LV
See how legitimate Windows executables can be abused for reconnaissance, data exfiltration and persistence during pentests. Useful for both red and blue teams hackers-arise.com/powershell-for… @three_cube @_aircorridor #blueteam #redteam #pentest
SysWhispers4 AV/EDR evasion via direct and indirect system calls Windows NT 3.1 through Windows 11 24H2 /x64/x86/WoW64/ARM64 github.com/JoasASantos/Sy… #dfir #blueteam #redteam #pentesting
Unisciti anche tu al #BLUETEAM! Entra a far parte di un grande gruppo, dinamico, familiare e stimolante in cui crescere insieme ad un team affiatato! 👉 Chiamaci al numero 0173.445696 o consulta le posizioni aperte su mollofratelli.com/lavorare-in-mo… G
Unauthenticated MCP Endpoint Allows Remote Nginx Takeover github.com/0xJacky/nginx-… #cybersecurity #redteam #blueteam
Most social engineering attacks don’t hack systems, they hack urgency. While studying cybersecurity labs, I noticed attackers rely on rushed decisions more than technical flaws. Simple check: slow down and verify requests out of band. #cybersecurity #BlueTeam
We showed how the backdoor works and how to detect it in our article hackers-arise.com/compromising-t… #apt #blueteam
🚨 Rapid7 Labs has uncovered stealth “sleeper cell” access embedded in telecommunications networks by a China-nexus threat actor. Telecom networks are the central nervous system of the digital world. This type of compromise impacts everyone. IoCs & more: r-7.co/3NQ7szA
BypassAV list Map listing essential techniques to bypass anti-virus and EDR, in HTML and markdown format. A post by matro7ch habibi. Source: github.com/matro7sh/Bypas… #redteam #blueteam #maldev #malwaredevelopment
Phishing emails tried it… I analyzed it 🕵️♂️🛡️ Just completed a hands-on Phishing Analysis challenge. Diving into email headers, tracing delivery details, and spotting red flags one lab at a time. On to the next challenge 🚀 #CyberSecurity #SOCAnalyst #BlueTeam #Phishing #InfoSec
In light of recent investigations into BPFDoor, a backdoor reportedly installed by Chinese actors in telecom systems, we wrote an article showing how it works and how you can detect it hackers-arise.com/compromising-t… @three_cube @_aircorridor #pentesting #redteam #blueteam #apt
New post: CVE-2025-15556 : the Notepad++ supply chain attack. They never touched the code. Just the updater. Full breakdown + IOCs + detection guide blog.lordsudo.com/posts/supplych… #CyberSecurity #ThreatIntel #BlueTeam #SupplyChain
👇 Enlace a la clase técnica completa. youtube.com/watch?v=kSpwro… #Ciberseguridad #BlueTeam #Redes #TuDefensaDigital #InfoSec
Not everyone chooses defense. It’s a mindset: • Staying curious • Thinking ahead • Seeing what others miss For some, that’s where it starts. Join the Defender Circle 👉 bit.ly/3OjGIYJ #CyberSecurity #BlueTeam #DFIR #InfoSec
These polls are a snapshot in time. Yes, as a Dem I find them encouraging, but I'll keep working working working to elect #BlueTeam Members.
🚨SHOCK POLL: Jon Ossoff leads by a whopping 7% in the Georgia's US Senate election. He won his first term in 2021 by just 1.2%. Georgia - 2026 US Senate 🟦Jon Ossoff* 51% (+7) 🟥Mike Collins 44% Echelon Insights | April 3-9, 2026 | 407 LV
Phishing emails tried it… I analyzed it 🕵️♂️🛡️ Just completed a hands-on Phishing Analysis challenge. Diving into email headers, tracing delivery details, and spotting red flags one lab at a time. On to the next challenge 🚀 #CyberSecurity #SOCAnalyst #BlueTeam #Phishing #InfoSec
Unisciti anche tu al #BLUETEAM! Entra a far parte di un grande gruppo, dinamico, familiare e stimolante in cui crescere insieme ad un team affiatato! 👉 Chiamaci al numero 0173.445696 o consulta le posizioni aperte su mollofratelli.com/lavorare-in-mo… G
New post: CVE-2025-15556 : the Notepad++ supply chain attack. They never touched the code. Just the updater. Full breakdown + IOCs + detection guide blog.lordsudo.com/posts/supplych… #CyberSecurity #ThreatIntel #BlueTeam #SupplyChain
💡 LESSON LEARNED (7/7) You don’t need a job to get experience. Build the lab. Break things. Document everything. This is how you go from Political Science grad → SOC analyst. RT if this helps someone 🙌 #CyberSecurity #SOC #BlueTeam #Wazuh #SIEM #InfoSec #MITREATTaCK #HomeLab
👇 Enlace a la clase técnica completa. youtube.com/watch?v=kSpwro… #Ciberseguridad #BlueTeam #Redes #TuDefensaDigital #InfoSec
Not everyone chooses defense. It’s a mindset: • Staying curious • Thinking ahead • Seeing what others miss For some, that’s where it starts. Join the Defender Circle 👉 bit.ly/4vzH7Hc #CyberSecurity #BlueTeam #DFIR #InfoSec
Not everyone chooses defense. It’s a mindset: • Staying curious • Thinking ahead • Seeing what others miss For some, that’s where it starts. Join the Defender Circle 👉 bit.ly/41E3MEw #CyberSecurity #BlueTeam #DFIR #InfoSec
Not everyone chooses defense. It’s a mindset: • Staying curious • Thinking ahead • Seeing what others miss For some, that’s where it starts. Join the Defender Circle 👉 bit.ly/3OjGIYJ #CyberSecurity #BlueTeam #DFIR #InfoSec
Most social engineering attacks don’t hack systems, they hack urgency. While studying cybersecurity labs, I noticed attackers rely on rushed decisions more than technical flaws. Simple check: slow down and verify requests out of band. #cybersecurity #BlueTeam
I successfully earned the 3 Days Streak badge on @CyberDefenders! cyberdefenders.org/blueteam-ctf-c… #CyberSecurity #BlueYard #blueteam #InfoSec #SOC
cyberdefenders.org
CyberDefenders | @omaszaboss01 earned badge
@omaszaboss01 earned badge.
🚀 Day 22/30 (#M4ACE): Learned about SOC and Blue Team roles—monitoring, detecting, and responding to threats. Understanding how defenders protect systems is shaping my interest in becoming a cybersecurity analyst 🔐💻 #Cybersecurity #BlueTeam #M4ACE
This is another awesome victory for #BlueTeam! #VirginiaTech #VaPol #Richmond #Alexandria #Arlington #VirginiaBeach
Did you know there's a FREE 16-week hands-on Blue Team course on YouTube? Build a portfolio with SOC labs, detection rules, and incident response simulations. Perfect for aspiring SOC analysts or detection engineers! Are you ready to enhance your skills? 💻 #BlueTeam
ThreatIntelChecker: a cross-platform Python and PowerShell tool that checks IPs, domains, URLs, and SHA256 hashes across multiple threat intelligence sources. github.com/eddietorial/Th… #SOC #ThreatIntelligence #BlueTeam #SIEM #Splunk #Python #PowerShell #CyberSecurity
Blue Team ready to roll ⚾🔥 Middle School Baseball hits the field TONIGHT at 6:30PM 📍 Ocoee Pull up and cheer them on—let’s get it! 💪 #Baseball #GameNight #BlueTeam #LetsGo
UNISCITI ANCHE TU AL #BLUETEAM! CERCHIAMO UN IMPIEGATO/A AMMINISTRATIVO/A DA INSERIRE ALL'INTERNO DELLA NOSTRA FILIALE DI VENEZIA. 👉Vuoi maggiori informazioni? Chiamaci al numero 0173.445696 👉 mollofratelli.com/lavorare-in-mo… GRUPPO MOLLO: INSIEME E’ TUTTA UN’ALTRA COSA!
You thought I quit? Jokes on you. Day 27–30 of becoming a SOC Analyst Finished networking basics and moved on to building a roadmap for my SOC journey. Studied SOC fundamentals, the pillars of a SOC analyst, and the 5 W’s of the alert triangle. Hands-on labs completed.” #BlueTeam
DAY 27 of becoming a soc anslyst Finished networking basics and i got my badge. @Ahmed___khaan @Cyberhijabitech #SOCAnalyst #BlueTeam #CyberDefense #SIEM #SecurityOperations #ThreatDetection #CyberSecurity #EntryLevelSOC
Most attacks don’t “hack” passwords, they bypass them. While studying MFA, I noticed attackers target the human step, not the tech. MFA adds a second proof of identity. Tip: avoid push fatigue, use authenticator apps over SMS. #cybersecurity #BlueTeam
How to protect yourself: Use a password manager Enable Multi-Factor Authentication (MFA) everywhere possible Use strong, unique passwords for every account Avoid password reuse at all costs #Cybersecurity #BlueTeam #IAM
New post: CVE-2025-15556 : the Notepad++ supply chain attack. They never touched the code. Just the updater. Full breakdown + IOCs + detection guide blog.lordsudo.com/posts/supplych… #CyberSecurity #ThreatIntel #BlueTeam #SupplyChain
UnderlayCopy_bof BOF for Havoc that copies locked Windows files (SAM, SYSTEM, NTDS.dit) via raw MFT parsing. No VSS, no Registry APIs, no PowerShell github.com/Muz1K1zuM/Unde… #blueteam #redteam #dfir
For those of you interested in digital forensics, Part 3 of our Registry Forensics series is now out. Here we cover evidence of execution hackers-arise.com/digital-forens… @three_cube @_aircorridor @DI0256 #forensics #cybersecurity #blueteam
Your attacker already knows your gaps. Do you? 🛡️ @SecHubb, @secgreene, David Hoelzer & 15+ SANS experts. April 30th — a full day of real tactics, real tools, no filler. Secure Your Fortress → go.sans.org/X9vR6R #CyberDefense #BlueTeam
See how legitimate Windows executables can be abused for reconnaissance, data exfiltration and persistence during pentests. Useful for both red and blue teams hackers-arise.com/powershell-for… @three_cube @_aircorridor #blueteam #redteam #pentest
Flying Under the Radar with Powershell A new article on Living off the Land binaries has been published. Especially helpful for those just getting started hackers-arise.com/powershell-for… @three_cube @_aircorridor @DI0256 @IamSmouk #redteam #blueteam #powershell #pentesting
SynthAPT A framework for building payloads with some interesting AI-driven features. For example, it includes a Python in-memory interpreter and supports BOFs github.com/acedef/SynthAP… #threatintel #blueteam #redteam
In light of recent investigations into BPFDoor, a backdoor reportedly installed by Chinese actors in telecom systems, we wrote an article showing how it works and how you can detect it hackers-arise.com/compromising-t… @three_cube @_aircorridor #pentesting #redteam #blueteam #apt
An interesting piece of research on stopping arbitrary ETW traces using an undocumented “Stop Trace” flag originhq.com/blog/securityt… #ThreatHunting #blueteam #redteam #pentesting
Making forensic CSV data easier and actually useful to analyze with Forensic Timeliner. Works well with files generated by KAPE, Chainsaw, Axiom, NirSoft, and Hayabusa hackers-arise.com/digital-forens… @three_cube @_aircorridor #dfir #forensics #blueteam
Defenders, these two scripts will help with endpoint and ACL security 1. Audit.ps1 2. ADACLScanner.ps1 Learn how: hackers-arise.com/powershell-for… @three_cube @_aircorridor #blueteam
Elastic EDR Bypass An example of bypassing Elastic EDR that allows to execute your own malware on an endpoint systemweakness.com/lateral-moveme… #threatintel #blueteam #redteam
A tool for enumerating SharePoint via Microsoft Graph. It recursively downloads files and logs every HTTP request for correlation with SIEM and development of detection rules github.com/zh54321/ShareP… #blueteam #redteam #pentesting #windows
Staring at’ nano /var/ossec/etc/ossec.conf’ for way too long. It’s wild how one tiny character or a missing / in the XML header can break an entire Wazuh agent. It’s frustrating as hell, Still fighting the config, but I’m not logging off until it’s right #SOC #Wazuh #BlueTeam
PrivHound An extension for #BloodHound designed to identify local privilege escalation (LPE) vectors github.com/dazzyddos/Priv… #blueteam #redteam #pentesting
Bypassing Detections with Command-Line Obfuscation wietzebeukema.nl/blog/bypassing… #blueteam #redteam #pentesting
Something went wrong.
Something went wrong.
United States Trends
- 1. #EarthDay N/A
- 2. SPLC N/A
- 3. Clayface N/A
- 4. Charles Johnson N/A
- 5. Storage Wars N/A
- 6. Logan Gilbert N/A
- 7. Pickens N/A
- 8. Spirit Airlines N/A
- 9. Warnock N/A
- 10. Darrell Sheets N/A
- 11. Burnley N/A
- 12. Communities N/A
- 13. Roony N/A
- 14. #AllStars11 N/A
- 15. Ric Flair N/A
- 16. Rocket Power N/A
- 17. $NOW N/A
- 18. Elston Howard N/A
- 19. Peter Lambert N/A
- 20. David Scott N/A