image

Red Teaming Toolkit Collection

# Red Teaming/Adversary Simulation Toolkit<span class="blockHeadingAnchorIcon-1c2bf3cb"></span> *...

image

bypass endpoint with XLM weaponization

XLM (macro 4.0 ) considered an excellent technique for red team operations since XLM is challenging...

image

red team cheatsheet

<figure data-key="e8bd795cd9fe45fd916293d2255b6fe0" class="reset-3c756112--figure-c0d4b308" contente...

image

Bypass Symantec Email Security.cloud

During attack Simulation , you may face Symantec Email Security Cloud (Message Lab ) while conductin...

image

Reverse Shell with password protection

we are going to use wssocket module with **free pascal** as coding language . our goal to execute cm...

image

.NET Exploitation MITRE T1121

executing **csharp** shell codes is possible through `regasm` and `regsvcs` , observed that some of...

image

Gophish on Digital Ocean with Blacklist Range

> Gophish is a powerful, easy-to-use, open-source phishing toolkit meant to help pentesters and busi...

image

DirectX Software Development Kit(SDK) RCE Exploitation

during our attack we will focus on one of these utilities `MicroSoft Cross-Platform Audio Creation T...

image

Microsoft File CheckSum DLL hijacking Attack

file checsum with a process `fciv.exe` will load and execute malicious Dynamic Link Libraries {DLL}...

image

DLL Self Contained in PowerShell

<span class="colour" style="color: rgb(59, 69, 78);">it is possible to load an executable as array o...

image

Windows Blind Files Collection

through exploitation of windows system environment , it is important to know list of system files th...

image

Active Directory (Attack & Defense )

understand the specific tactics, techniques, and procedures (TTPs) attackers are leveraging to compr...

image

offensive cheatsheet

# Gathering information Stage <span class="size"></span> ## port scanning <span class="size"></sp...

image

Privilege Escalation cheatsheet

# Windows ## Kernel Exploits * systeminfo -> look up missing kb's * systeminfo \| findstr /B...

image

Web attacks payloads collections

a collection of common used payloads needed for web application testing (fuzzing),the payloads has b...

image

handy techniques to bypass environment restrictions

through a red teaming assessment you may face some of the restriction due to policy enforcement / ED...

image

bypass restricted command prompt for none-privileged users

The Windows Command Prompt (sometimes called the DOS prompt) is a tool that allows administrators to...