Homepage
Open in app
Sign in
Get started
R3d Buck3T
Penetration Testing, Vulnerability Assessment and Red Team Learning
Web Security
Cloud Security
Active Directory
Network Security
Wireless
Archive
About
GitHub
Follow
Latest Articles
Payload Delivery with Azure Static Website and IPFS Dropper
Payload Delivery with Azure Static Website and IPFS Dropper
Weaponizing InterPlanetary File System and Azure Sites
Nairuz Abulhul
May 22
Configure Fireprox for IP Rotation using AWS API Gateway
Configure Fireprox for IP Rotation using AWS API Gateway
Unlock the power of the AWS API gateway with Fireprox configuration
Nairuz Abulhul
May 12
Red Teaming in the Cloud: Deploying Azure VMs for C2 Infrastructure
Red Teaming in the Cloud: Deploying Azure VMs for C2 Infrastructure
A Guide to Deploying Red Team Infrastructure on Azure
Nairuz Abulhul
Dec 14, 2023
Abusing Dynamic Groups in AzureAD [Part 1]
Abusing Dynamic Groups in AzureAD [Part 1]
Leveraging Dynamic Groups for Elevated Privileges
Nairuz Abulhul
Jan 4
Red Teaming in the Cloud: Installing Mythic C2 on Azure VM
Red Teaming in the Cloud: Installing Mythic C2 on Azure VM
C2 Deployment and Operations — Infrastructure
Nairuz Abulhul
Dec 26, 2023
CrackMapExec in Action: Enumerating Windows Networks (Part 1)
CrackMapExec in Action: Enumerating Windows Networks (Part 1)
Strategically Mapping Targets inside the Internal Network
Nairuz Abulhul
Sep 20, 2023
RCE with Server-Side Template Injection
RCE with Server-Side Template Injection
Python Flask Application with Jinja2 Template — Doctor HTB machine
Nairuz Abulhul
Nov 19, 2021
Domain Takeover with PetitPotam Exploit
Domain Takeover with PetitPotam Exploit
domain escalation from a low-privileged user to a domain admin
Nairuz Abulhul
Apr 23, 2022
Exploiting a Misconfigured NFS Share
Exploiting a Misconfigured NFS Share
Network File Shares, Network Exploitation, Metasploitable
Nairuz Abulhul
Sep 6, 2021
Privilege Escalation with MySQL User Defined Functions
Privilege Escalation with MySQL User Defined Functions
Extending MySQL functionality with UDFs — Banzai, Proving Grounds
Nairuz Abulhul
Oct 18, 2021
Attacking Kerberos Constrained Delegation
Attacking Kerberos Constrained Delegation
Trust this user/computer for delegation to specified services only
Nairuz Abulhul
Mar 9, 2022
Certificate-based Authentication over WinRM
Certificate-based Authentication over WinRM
Advanced WinRM Security: Achieving Passwordless Authentication with Certificate-Based Methods
Nairuz Abulhul
Jun 14, 2023
Privilege Escalation with Insecure Windows Service Permissions
Privilege Escalation with Insecure Windows Service Permissions
Guide to Privilege Escalation through Insecure Windows Service Permissions.
Nairuz Abulhul
Aug 29, 2023
Windows PrivEsc with SeBackupPrivilege
Windows PrivEsc with SeBackupPrivilege
Obtain NTLM hashes in Windows Domain Controller machines
Nairuz Abulhul
Jul 26, 2021
About R3d Buck3T
Latest Stories
Archive
About Medium
Terms
Privacy
Teams