This is a subreddit preview page. If you have a GummySearch account, please add this Subreddit to your audience to view the full analysis features there.
/r/purpleteamsec/

r/purpleteamsec

7k members
r/purpleteamsec is a subreddit with 7k members. Its distinguishing qualities are that the community is medium in size.
At r/purpleteamsec, we believe that when Red and Blue teams unite, security becomes not just a goal but a shared journey. Join us today to connect, learn, and collaborate in the pursuit of a safer digital world. Your insights, experiences, and questions are all welcome here. Let's harness the power of Purple Teaming and protect what matters most! Remember, the future of cybersecurity is Purple. 💜

Popular Themes in r/purpleteamsec

#1
Solution Requests
: "WindowsDowndate: A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities"
15 posts
#2
Advice Requests
: "A compilation of guides and resources that the Microsoft Incident Response team has developed on threat hunting, case studies, incident response guides, and more"
10 posts
#3
Ideas
: "A new reverse shell PowerShell Script - Antivirus Evasion"
8 posts
#4
Opportunities
: "LitterBox: sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment"
7 posts
#5
News
: "Red Teaming with ServiceNow"
3 posts
#6
Self-Promotion
: "Presentation of my tool of purpleteaming : PurpleLab"
2 posts
#7
Pain & Anger
: "Abusing Intune Permissions for Lateral Movement and Privilege Escalation in Entra ID Native Environments"
1 post

Popular Topics in r/purpleteamsec

#1

C2

: "LOLC2 - collection of C2 frameworks that leverage legitimate services to evade detection"
21 posts
#2

Edr

: "BYOVD to the next level. Blind Edr with Windows Symbolic Link"
20 posts
#3

Windows

: "WindowsDowndate: A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities"
19 posts
#4

Malware

: "Malware development: persistence - Microsoft Edge - part 1. Simple C example"
13 posts
#5

Security

: "A powerful utility designed for Security professionals to create Windows shortcut (.lnk) files that simulate various techniques used in Security assessments. It supports multiple LOLBINs, custom payloads, and detailed configuration options to assist in controlled Security testing scenarios"
12 posts
#6

Tool

: "DS Viper - a powerful Tool designed to bypass Windows Defender's security mechanisms, enabling seamless execution of payloads on Windows systems without triggering security alerts"
10 posts
#7

Phishing

: "Phishing by Design: Two-Step Attacks Using Microsoft Visio Files"
7 posts
#8

Kerberos

: "Kerberos OPSEC: Offense & Detection Strategies for Red and Blue Team - Part 2 : AS REP Roasting"
7 posts
#9

Powershell

: "A new reverse shell Powershell Script - Antivirus Evasion"
7 posts
#10

Threat Hunting

: "Advanced KQL for Threat Hunting: Window Functions — Part 2"
6 posts

Member Growth in r/purpleteamsec

Yearly
+428 members(6.3%)

Similar Subreddits to r/purpleteamsec

/r/blackhat

r/blackhat

101k members
15.7% / yr
/r/blueteamsec

r/blueteamsec

51k members
18.5% / yr
/r/CTI

r/CTI

774 members
28.6% / yr
/r/cybersecurity

r/cybersecurity

1.2M members
61.2% / yr
/r/hacking

r/hacking

2.8M members
4.7% / yr
/r/Malware

r/Malware

85k members
10.1% / yr
/r/Malwarebytes

r/Malwarebytes

13k members
15.3% / yr
/r/redteamsec

r/redteamsec

38k members
11.6% / yr
/r/sysadmin

r/sysadmin

997k members
13.9% / yr
/r/ThreathuntingDFIR

r/ThreathuntingDFIR

1k members
37.8% / yr