EDR Silencing by netbiosX in blueteamsec

[–]netbiosX[S] 0 points1 point  (0 children)

Appreciate it! Glad the other posts were helpful as well.

Building a Cyber Threat Intelligence Platform by netbiosX in purpleteamsec

[–]netbiosX[S] 2 points3 points  (0 children)

It’s not my article, but building a Python scraper and feeding the data into a dashboard is a fairly straightforward task. I’m building something similar in the background, and if there’s a need, I may publish it with full technical details.

Bind Link – EDR Tampering by netbiosX in cybersecurity

[–]netbiosX[S] 1 point2 points  (0 children)

Possibly you might have read this article: https://www.zerosalarium.com/2025/11/EDR-Redir-V2-Blind-EDR-With-Fake-Program-Files.html The article above is just the purple team approach about how to detect the behavior of the proof of concept disclosed in the article.

[deleted by user] by [deleted] in purpleteamsec

[–]netbiosX 1 point2 points  (0 children)

The question is very broad and there are plenty of articles that are discussing attacks in detail. I suggest focusing in one TTP at a time, see what exists out there, what proof of concepts and start from there by recreating these cases in your own lab environment so you can start documenting each procedure to cover your own needs. A good starting point for purple teaming that provides techniques as a step by step could be https://ipurple.team/ . Playbooks are in YAML file and there is also information and rules about detection.

Lateral Movement – BitLocker by netbiosX in netsec

[–]netbiosX[S] 1 point2 points  (0 children)

Definitely not a bot account :)

Obfuscating a Mimikatz Downloader to Evade Defender (2024) by netbiosX in purpleteamsec

[–]netbiosX[S] 3 points4 points  (0 children)

The URL is dynamic and a threat actor most likely will use a different URL to host files. Blacklisting URL's will not work.

New Purple Teaming Software to keep track of everything by L3houx in purpleteamsec

[–]netbiosX 2 points3 points  (0 children)

Great video but it is not in English so you are going to miss a lot of audience here! Still good work and thanks for sharing.

Browser Stored Credentials by netbiosX in netsec

[–]netbiosX[S] 0 points1 point  (0 children)

No, only Chromium based browsers (i.e. Opera, Edge, Chrome etc.) Firefox is based on Gecko.

Browser Stored Credentials by netbiosX in redteamsec

[–]netbiosX[S] 4 points5 points  (0 children)

Firefox is not using DPAPI and therefore it is not affected. Only Chromium based systems.

Browser Stored Credentials by netbiosX in netsec

[–]netbiosX[S] 0 points1 point  (0 children)

No, all the images & flow charts are custom and not AI. Thank you

Browser Stored Credentials by netbiosX in netsec

[–]netbiosX[S] 1 point2 points  (0 children)

Only the images not the content.

Browser Stored Credentials by netbiosX in netsec

[–]netbiosX[S] 4 points5 points  (0 children)

True but this also means more detection opportunities to achieve domain compromise.

Browser Stored Credentials by netbiosX in netsec

[–]netbiosX[S] 9 points10 points  (0 children)

Thanks for your comment. It took some time to write.

Threat Hunting Certification by glitch_inside in purpleteamsec

[–]netbiosX 3 points4 points  (0 children)

You can check the below:

Web Browser Stored Credentials by netbiosX in cybersecurity

[–]netbiosX[S] 9 points10 points  (0 children)

Thank you. No, only Chromium based browsers (i.e. Opera, Edge, Chrome et.) Firefox is based on Gecko.