# Red Teaming/Adversary Simulation Toolkit<span class="blockHeadingAnchorIcon-1c2bf3cb"></span> *...
XLM (macro 4.0 ) considered an excellent technique for red team operations since XLM is challenging...
<figure data-key="e8bd795cd9fe45fd916293d2255b6fe0" class="reset-3c756112--figure-c0d4b308" contente...
During attack Simulation , you may face Symantec Email Security Cloud (Message Lab ) while conductin...
we are going to use wssocket module with **free pascal** as coding language . our goal to execute cm...
executing **csharp** shell codes is possible through `regasm` and `regsvcs` , observed that some of...
> Gophish is a powerful, easy-to-use, open-source phishing toolkit meant to help pentesters and busi...
during our attack we will focus on one of these utilities `MicroSoft Cross-Platform Audio Creation T...
file checsum with a process `fciv.exe` will load and execute malicious Dynamic Link Libraries {DLL}...
<span class="colour" style="color: rgb(59, 69, 78);">it is possible to load an executable as array o...
through exploitation of windows system environment , it is important to know list of system files th...
understand the specific tactics, techniques, and procedures (TTPs) attackers are leveraging to compr...
# Gathering information Stage <span class="size"></span> ## port scanning <span class="size"></sp...
# Windows ## Kernel Exploits * systeminfo -> look up missing kb's * systeminfo \| findstr /B...
a collection of common used payloads needed for web application testing (fuzzing),the payloads has b...
through a red teaming assessment you may face some of the restriction due to policy enforcement / ED...
The Windows Command Prompt (sometimes called the DOS prompt) is a tool that allows administrators to...
In this blog, I am going to explain some of the unique features of 0xsp mongoose, which I am sure mo...