This is a subreddit preview page. If you have a GummySearch account, please add this Subreddit to your audience to view the full analysis features there.
r/purpleteamsec is a subreddit with 7k members. Its distinguishing qualities are that the community is medium in size.
At r/purpleteamsec, we believe that when Red and Blue teams unite, security becomes not just a goal but a shared journey. Join us today to connect, learn, and collaborate in the pursuit of a safer digital world. Your insights, experiences, and questions are all welcome here. Let's harness the power of Purple Teaming and protect what matters most!
Remember, the future of cybersecurity is Purple. 💜
Popular Themes in r/purpleteamsec
#1
Solution Requests
: "WindowsDowndate: A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities"
17 posts
#2
Advice Requests
: "A compilation of guides and resources that the Microsoft Incident Response team has developed on threat hunting, case studies, incident response guides, and more"
10 posts
#3
Ideas
: "A new reverse shell PowerShell Script - Antivirus Evasion"
8 posts
#4
Opportunities
: "LitterBox: sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment"
7 posts
#5
News
: "An Operator’s Guide to Device-Joined Hosts and the PRT Cookie"
7 posts
#6
Self-Promotion
: "Presentation of my tool of purpleteaming : PurpleLab"
2 posts
#7
Pain & Anger
: "Abusing Intune Permissions for Lateral Movement and Privilege Escalation in Entra ID Native Environments"
1 post
Popular Topics in r/purpleteamsec
#1
C2
: "LOLC2 - collection of C2 frameworks that leverage legitimate services to evade detection"
19 posts
#2
Windows
: "WindowsDowndate: A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities"
18 posts
#3
Edr
: "BYOVD to the next level. Blind Edr with Windows Symbolic Link"
17 posts
#4
Malware
: "Malware development: persistence - Microsoft Edge - part 1. Simple C example"
13 posts
#5
Powershell
: "A new reverse shell Powershell Script - Antivirus Evasion"
10 posts
#6
Security
: "A powerful utility designed for Security professionals to create Windows shortcut (.lnk) files that simulate various techniques used in Security assessments. It supports multiple LOLBINs, custom payloads, and detailed configuration options to assist in controlled Security testing scenarios"
8 posts
#7
Red Team
: "From Evidence to Advantage: Leveraging Incident Response Artifacts for Red Team Engagements"
7 posts
#8
Python
: "Create your own C2 using Python- Part 3"
6 posts
#9
Ad
: "AdCS Exploitation Part 2: Certificate Mapping + ESC15"
4 posts
#10
Phishing
: "Phishing by Design: Two-Step Attacks Using Microsoft Visio Files"
4 posts
Member Growth in r/purpleteamsec
Yearly
+459 members(6.7%)
Similar Subreddits to r/purpleteamsec

r/blueteamsec
52k members
19.0% / yr

r/chrome
161k members
18.6% / yr

r/hacking
2.8M members
4.7% / yr
r/Infosec
28k members
6.8% / yr

r/it
88k members
55.3% / yr

r/Malware
85k members
10.0% / yr

r/PowerShell
277k members
12.3% / yr

r/redteamsec
38k members
13.5% / yr

r/sysadmin
1.0M members
16.0% / yr

r/ThreathuntingDFIR
1k members
40.3% / yr