This is a subreddit preview page. If you have a GummySearch account, please add this Subreddit to your audience to view the full analysis features there.
r/purpleteamsec is a subreddit with 7k members. Its distinguishing qualities are that the community is medium in size.
At r/purpleteamsec, we believe that when Red and Blue teams unite, security becomes not just a goal but a shared journey. Join us today to connect, learn, and collaborate in the pursuit of a safer digital world. Your insights, experiences, and questions are all welcome here. Let's harness the power of Purple Teaming and protect what matters most!
Remember, the future of cybersecurity is Purple. 💜
Popular Themes in r/purpleteamsec
#1
Solution Requests
: "Bypassing BitLocker Encryption: Bitpixie PoC and WinPE Edition"
21 posts
#2
Ideas
: "A new reverse shell PowerShell Script - Antivirus Evasion"
13 posts
#3
News
: "An Operator’s Guide to Device-Joined Hosts and the PRT Cookie"
11 posts
#4
Advice Requests
: "A compilation of guides and resources that the Microsoft Incident Response team has developed on threat hunting, case studies, incident response guides, and more"
9 posts
#5
Opportunities
: "LitterBox: sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment"
6 posts
#6
Pain & Anger
: "Windows is and always will be a Potatoland"
2 posts
Popular Topics in r/purpleteamsec
#1
Malware
: "Practical Malware Development"
20 posts
#2
C2
: "LOLC2 - collection of C2 frameworks that leverage legitimate services to evade detection"
17 posts
#3
Edr
: "GitHub - SaadAhla/dark-kill: A user-mode code and its rootkit that will Kill Edr Processes permanently by leveraging the power of Process Creation Blocking Kernel Callback Routine registering and ZwTerminateProcess."
16 posts
#4
Windows
: "Windows is and always will be a Potatoland"
14 posts
#5
Powershell
: "A new reverse shell Powershell Script - Antivirus Evasion"
9 posts
#6
Red Team
: "From Evidence to Advantage: Leveraging Incident Response Artifacts for Red Team Engagements"
8 posts
#7
Security
: "A powerful utility designed for Security professionals to create Windows shortcut (.lnk) files that simulate various techniques used in Security assessments. It supports multiple LOLBINs, custom payloads, and detailed configuration options to assist in controlled Security testing scenarios"
8 posts
#8
Phishing
: "Phishing by Design: Two-Step Attacks Using Microsoft Visio Files"
6 posts
#9
Active Directory
: "Practical Incident Response - Active Directory"
6 posts
#10
Kerberos
: "From NTLM relay to Kerberos relay: Everything you need to know"
4 posts
Member Growth in r/purpleteamsec
Yearly
+597 members(8.8%)
Similar Subreddits to r/purpleteamsec

r/blueteamsec
54k members
21.3% / yr

r/cybersecurity
1.2M members
47.5% / yr

r/hackernews
91k members
6.5% / yr

r/it
93k members
54.2% / yr

r/netsec
529k members
5.8% / yr

r/PowerShell
281k members
11.7% / yr

r/redteamsec
40k members
18.0% / yr

r/rust
353k members
18.1% / yr

r/sysadmin
1.1M members
22.5% / yr

r/ThreathuntingDFIR
1k members
50.1% / yr