đź“–
Documentation
Ctrl
k
Copy
Group 1
Red team
xbz0n@sh:~# Blog
xbz0n.sh
Evading detection in memory - Pt 1: Sleep Obfuscation - Foliage
Oblivion
Kharon/Payload_Type/kharon at main · MythicAgents/Kharon
GitHub
Checking for Symantec Account Connectivity Credentials (ACCs) with PrivescCheck
itm4n’s blog
Part 1: Creating Mythic C2 Agent
c0rnbread blog
ArgFuscator
ArgFuscator
DLL hijacking with exported functions. Example: Microsoft Teams
cocomelonc
Technical Case Study: The Tale of Privilege Escalation vs the Unstartable Service
Medium
GitHub - jfmaes/Invoke-DLLClone: Koppeling x Metatwin x LazySign
GitHub
Revisiting COM Hijacking - SpecterOps
SpecterOps
GitHub - rtecCyberSec/BitlockMove: Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking
GitHub
Obfuscating a Mimikatz Downloader to Evade Defender (2024)
Medium
Flangvik
YouTube
c0rnbread blog
c0rnbread blog
Transforming Red Team Ops with Mythic’s Hidden Gems: Browser Scripting - SpecterOps
SpecterOps
LOLAD and AD Exploitation
lolad-project.github.io
Lateral Movement: Abuse the Power of DCOM Excel Application
Medium
Insights - MDSec
MDSec
Domain Fronting is Dead. Long Live Domain Fronting!
Praetorian
Domain Takeover via Kerberos Unconstrained Delegation
Checkmate
Unconstrained Delegation in Active Directory
Praetorian
Resource Based Constrained Delegation
www.r-tec.net
Previous
Application mode kiosque
Last updated
29 days ago