- From Misconfigured Certificate Template to Windows Domain Admin https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/from-misconfigured-certificate-template-to-domain-admin 2 comments netsec
- Taking Back the Windows Search Bar, Help, and more. Looking for feedback! https://www.ired.team/offensive-security/privilege-escalation/t1183-image-file-execution-options-injection 3 comments privacy
- Tutorial: Return-to-libc https://www.ired.team/offensive-security/code-injection-process-injection/binary-exploitation/return-to-libc 2 comments netsec
- Writing a Custom Bootloader https://www.ired.team/miscellaneous-reversing-forensics/windows-kernel-internals/writing-a-custom-bootloader 4 comments reverseengineering
- Dumping LSASS without Mimikatz with MiniDumpWriteDump == Reducing Chances of Getting Flagged https://www.ired.team/offensive-security/credential-access-and-credential-dumping/dumping-lsass-passwords-without-mimikatz-minidumpwritedump-av-signature-bypass 4 comments reverseengineering
- Dumping LSASS without Mimikatz with MiniDumpWriteDump == Reducing Chances of Getting Flagged https://www.ired.team/offensive-security/credential-access-and-credential-dumping/dumping-lsass-passwords-without-mimikatz-minidumpwritedump-av-signature-bypass 25 comments netsec
- ShadowMove: Lateral Movement by Duplicating Existing Connected Sockets https://www.ired.team/offensive-security/lateral-movement/shadowmove-lateral-movement-by-stealing-duplicating-existing-connected-sockets 20 comments netsec
- Windows API Hashing in Malware https://www.ired.team/offensive-security/defense-evasion/windows-api-hashing-in-malware 5 comments reverseengineering
Linking pages
- GitHub - joeavanzato/Trawler: PowerShell script to help Incident Responders discover adversary persistence mechanisms. https://github.com/joeavanzato/Trawler 31 comments
- So You Want To Be a Pentester? (Updated 2023) - Jack Hacks https://jhalon.github.io/becoming-a-pentester/ 14 comments
- Red Team Tactics: Writing Windows Kernel Drivers for Advanced Persistence (Part 1) https://v3ded.github.io/redteam/red-team-tactics-writing-windows-kernel-drivers-for-advanced-persistence-part-1 0 comments
- GitHub - Whitecat18/Rust-for-Malware-Development: This repository contains my complete resources and coding practices for malware development using Rust 🦀. https://github.com/Whitecat18/Rust-for-Malware-Development 0 comments