bars
📖
Documentation
search
circle-xmark
⌘
Ctrl
k
copy
Copy
chevron-down
Red Team
Red team article
xbz0n@sh:~# Blog
xbz0n.sh
chevron-right
Evading detection in memory - Pt 1: Sleep Obfuscation - Foliage
Oblivion
chevron-right
Kharon-Mtc/Payload_Type/kharon at main · MythicAgents/Kharon-Mtc
GitHub
chevron-right
Checking for Symantec Account Connectivity Credentials (ACCs) with PrivescCheck
itm4n’s blog
chevron-right
Part 1: Creating Mythic C2 Agent
c0rnbread blog
chevron-right
ArgFuscator
ArgFuscator
chevron-right
DLL hijacking with exported functions. Example: Microsoft Teams
cocomelonc
chevron-right
Technical Case Study: The Tale of Privilege Escalation vs the Unstartable Service
Medium
chevron-right
GitHub - jfmaes/Invoke-DLLClone: Koppeling x Metatwin x LazySign
GitHub
chevron-right
Revisiting COM Hijacking - SpecterOps
SpecterOps
chevron-right
GitHub - rtecCyberSec/BitlockMove: Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking
GitHub
chevron-right
Obfuscating a Mimikatz Downloader to Evade Defender (2024)
Medium
chevron-right
Flangvik
YouTube
chevron-right
c0rnbread blog
c0rnbread blog
chevron-right
Transforming Red Team Ops with Mythic’s Hidden Gems: Browser Scripting - SpecterOps
SpecterOps
chevron-right
LOLAD and AD Exploitation
lolad-project.github.io
chevron-right
Lateral Movement: Abuse the Power of DCOM Excel Application - SpecterOps
SpecterOps
chevron-right
Insights - MDSec
MDSec
chevron-right
Domain Fronting is Dead. Long Live Domain Fronting!
Praetorian
chevron-right
Domain Takeover via Kerberos Unconstrained Delegation
Checkmate
chevron-right
Unconstrained Delegation in Active Directory
Praetorian
chevron-right
Resource Based Constrained Delegation
www.r-tec.net
chevron-right
My Own VirtualAlloc Implementation using Module Stomping Technique
Medium
chevron-right
4. Shellcode Runner | Malware Development
www.scriptchildie.com
chevron-right
Previous
G.Utilise un technique d'API Hashing pour résoudre les addresses des fonctions de NTDLL
chevron-left
Last updated
1 month ago