This is a subreddit preview page. If you have a GummySearch account, please add this Subreddit to your audience to view the full analysis features there.
r/purpleteamsec is a subreddit with 7k members. Its distinguishing qualities are that the community is medium in size.
At r/purpleteamsec, we believe that when Red and Blue teams unite, security becomes not just a goal but a shared journey. Join us today to connect, learn, and collaborate in the pursuit of a safer digital world. Your insights, experiences, and questions are all welcome here. Let's harness the power of Purple Teaming and protect what matters most!
Remember, the future of cybersecurity is Purple. 💜
Popular Themes in r/purpleteamsec
#1
Solution Requests
: "WindowsDowndate: A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities"
11 posts
#2
Ideas
: "A new reverse shell PowerShell Script - Antivirus Evasion"
8 posts
#3
Opportunities
: "LitterBox: sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment"
7 posts
#4
Advice Requests
: "A compilation of guides and resources that the Microsoft Incident Response team has developed on threat hunting, case studies, incident response guides, and more"
6 posts
#5
Self-Promotion
: "Presentation of my tool of purpleteaming : PurpleLab"
2 posts
#6
Pain & Anger
: "Abusing Intune Permissions for Lateral Movement and Privilege Escalation in Entra ID Native Environments"
1 post
Popular Topics in r/purpleteamsec
#1
Edr
: "BYOVD to the next level. Blind Edr with Windows Symbolic Link"
21 posts
#2
C2
: "LOLC2 - collection of C2 frameworks that leverage legitimate services to evade detection"
16 posts
#3
Windows
: "WindowsDowndate: A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities"
13 posts
#4
Malware
: "Malware development: persistence - Microsoft Edge - part 1. Simple C example"
13 posts
#5
Phishing
: "Phishing by Design: Two-Step Attacks Using Microsoft Visio Files"
9 posts
#6
Powershell
: "A new reverse shell Powershell Script - Antivirus Evasion"
7 posts
#7
Kerberos
: "Kerberos OPSEC: Offense & Detection Strategies for Red and Blue Team - Part 2 : AS REP Roasting"
5 posts
#8
Red Team
: "From Evidence to Advantage: Leveraging Incident Response Artifacts for Red Team Engagements"
5 posts
#9
Linux
: "perfctl: A Stealthy Malware Targeting Millions of Linux Servers"
5 posts
#10
Python
: "Create your own C2 using Python- Part 3"
5 posts
Member Growth in r/purpleteamsec
Daily
+1 members(0.0%)
Monthly
+54 members(0.8%)
Yearly
+356 members(5.2%)
Similar Subreddits to r/purpleteamsec

r/antivirus
98k members
3.72% / mo

r/blueteamsec
50k members
1.85% / mo

r/cybersecurity
1.1M members
4.28% / mo
r/InfoSecNews
19k members
2.31% / mo

r/Malware
84k members
0.85% / mo

r/msp
197k members
1.02% / mo

r/netsec
518k members
0.52% / mo

r/redteamsec
36k members
2.38% / mo

r/sysadmin
979k members
0.86% / mo

r/ThreathuntingDFIR
1k members
3.30% / mo