The Weekly Purple Team
The goal of this channel is to provide a comprehensive understanding of cyber security by covering both attack and defense strategies using the purple team approach. This approach aims to illustrate the entire spectrum of an attack, from the initial method to detection and, if necessary, forensics to identify the attack. By adopting this approach, both offensive security professionals and defenders can gain valuable insights into the other’s field. My mission is to empower individuals with basic cyber security knowledge and contribute to the overall improvement of the cyber security industry by teaching effective attacks and defenses.
Сможете ли вы заставить Cobalt Strike превзойти EDR/XDR в 2025 году?
🔴🔵 Blinding EDR with Windows Filtering Platform
🚨 CVE-2025-59287: Purple Teaming критически важной уязвимости WSUS RCE
🔒 Когда EDR пропускает: обнаружение использования SSL C2 с помощью SIEM и обнаружение как кода
⚔️ Vibe Hacking using AI for Automation in Offensive & Defensive Ops 🚨
Отказ от кредитов в WSASS для обхода PPL
Using Velociraptor for Evil
Certipy Deep Dive — Escalating via AD CS with ESC4–ESC7
🔐 Certify 2.0 & ADCS Certificate Escalations (ESC1–ESC3)
EDR on EDR Violence: Bring Your Own Vulnerable EDR
🔐 Golden dMSA Attack & Detection | Purple Team Walkthrough
🛡️ Tunneling with Chisel & Running RDP Commands with NetExec
BYOVD Attack: Stealth LSASS Memory Extraction with Doppelganger
Ghosting AMSI and Taking Win10 and 11 to the DarkSide
🛡️ Deep Dive: BadSuccessor – Full Active Directory Compromise
Crippling Defender with DefendNot | Purple Team Attack & Detection Walkthrough
LSASS Dumping by Defender | Purple Teaming LSASS Dumping
8 Ways to Attack & Detect Lateral Movement – Rapid Fire Edition
🔍 Inside CVE-2025-24054: Purple Team Attack Breakdown
Использование списка разрешений Windows (WDAC) для уничтожения EDR
🚨 Data Bouncing: The Art of Indirect Data Exfiltration
Stealing RunAs Credentials While Bypassing EDR Detection
Linux Persistence Using Demonized Shell
Bypassing Mark of the Web with 7zip CVE-2025-0411
Раскрытие возможностей ретрансляции Kerberos: повышение привилегий и обеспечение устойчивости
Getting by EDR with Amnesiac
Exploiting Active Directory Certificate Services (ADCS) Using Only Two Tools
Exploiting and Detecting Palo Alto Networks CVE-2024-0012
Using Cloudflared for Tunneling and Persistence
Does Multi-Factor Authentication Stop Phishing in 2024?