đź“–
Documentation
Ctrlk
  • Documentation - Ajin
  • RFID Course
  • MOBILE
    • Challenge + course
    • Android
    • InsecureBankv2
    • IOS
    • Writeup
    • Projeter VPN sur Mobile
    • Lien intĂ©ressant
  • Web
    • CWEE
    • Outils
    • SQLi
    • Authentication vulnerabilities
    • Directory Traversal / Os command injection
    • Buisness Logique
    • Broken Access Control
    • File upload
    • SSRF
    • XXE
    • CSRF
    • Insecure Deserialization
    • Tools
  • API
    • DVWS
    • Methodologie
    • SSRF .NET
    • Outils
  • Audit de configuration
    • Ressource
  • Active directory
    • DĂ©finition
    • Configuration
  • Terminal
    • FZF
    • Oh my ZSH
    • Terminator
    • TMux
  • Environnement virtuel python
    • Pyenv
  • Cloud
    • Challenge Cloud
  • Audit de code
    • Ressource
  • Thick client
    • MĂ©thodologie
    • Architecture
    • Interaction GUI
    • Network
    • URLs
  • Mode Kiosque
    • Application mode kiosque
  • Group 1
    • Red team
Powered by GitBook
On this page
  1. Group 1

Red team

Logoxbz0n@sh:~# Blogxbz0n.sh
LogoEvading detection in memory - Pt 1: Sleep Obfuscation - FoliageOblivion
LogoKharon/Payload_Type/kharon at main · MythicAgents/KharonGitHub
LogoChecking for Symantec Account Connectivity Credentials (ACCs) with PrivescCheckitm4n’s blog
LogoPart 1: Creating Mythic C2 Agentc0rnbread blog
LogoArgFuscatorArgFuscator
LogoDLL hijacking with exported functions. Example: Microsoft Teamscocomelonc
LogoTechnical Case Study: The Tale of Privilege Escalation vs the Unstartable ServiceMedium
LogoGitHub - jfmaes/Invoke-DLLClone: Koppeling x Metatwin x LazySignGitHub
LogoRevisiting COM Hijacking - SpecterOpsSpecterOps
LogoGitHub - rtecCyberSec/BitlockMove: Lateral Movement via Bitlocker DCOM interfaces & COM HijackingGitHub
LogoObfuscating a Mimikatz Downloader to Evade Defender (2024)Medium
LogoFlangvikYouTube
Logoc0rnbread blogc0rnbread blog
LogoTransforming Red Team Ops with Mythic’s Hidden Gems: Browser Scripting - SpecterOpsSpecterOps
LogoLOLAD and AD Exploitationlolad-project.github.io
LogoLateral Movement: Abuse the Power of DCOM Excel ApplicationMedium
LogoInsights - MDSecMDSec
LogoDomain Fronting is Dead. Long Live Domain Fronting!Praetorian
LogoDomain Takeover via Kerberos Unconstrained DelegationCheckmate
LogoUnconstrained Delegation in Active DirectoryPraetorian
LogoResource Based Constrained Delegationwww.r-tec.net
PreviousApplication mode kiosque

Last updated 29 days ago