Vijay GuptaRed Team Warfare: Simulating Real-World Threats for Resilient CybersecurityIn the cybersecurity landscape, Red Teaming has emerged as a formidable strategy. It’s not just about vulnerability assessment — it’s…1d ago
Madhab TripathyExploit Blind SSRF VulnerabilityIn my previous blog, I went through an example of typical SSRF vulnerability, I hope that blog helps you to grab a better picture of SSRF…Apr 3
Vijay GuptaMastering Red TeamingIn today’s cybersecurity landscape, organizations face sophisticated threats that demand a proactive, offensive approach to defense. Red…4d ago4d ago
assume-breachHome Grown Red Team: Getting System On Windows 11 With Havoc C2Havoc C2 has quickly become one of my favorite open source C2s. It’s features offer everything that you need to complete a pentest or red…Oct 27, 20223Oct 27, 20223
Shebin53Abusing Active Directory ACLs for Privilege Escalation: A Red Team GuideMisconfigured Access Control Lists (ACLs) in AD can be leveraged by attackers to gain privileges. This blog will walk through how to…Nov 1Nov 1
Vijay GuptaRed Team Warfare: Simulating Real-World Threats for Resilient CybersecurityIn the cybersecurity landscape, Red Teaming has emerged as a formidable strategy. It’s not just about vulnerability assessment — it’s…1d ago
Madhab TripathyExploit Blind SSRF VulnerabilityIn my previous blog, I went through an example of typical SSRF vulnerability, I hope that blog helps you to grab a better picture of SSRF…Apr 3
Vijay GuptaMastering Red TeamingIn today’s cybersecurity landscape, organizations face sophisticated threats that demand a proactive, offensive approach to defense. Red…4d ago
assume-breachHome Grown Red Team: Getting System On Windows 11 With Havoc C2Havoc C2 has quickly become one of my favorite open source C2s. It’s features offer everything that you need to complete a pentest or red…Oct 27, 20223
Shebin53Abusing Active Directory ACLs for Privilege Escalation: A Red Team GuideMisconfigured Access Control Lists (ACLs) in AD can be leveraged by attackers to gain privileges. This blog will walk through how to…Nov 1
SirGlennUnderstanding the shadow Credential attack.The Shadow Credential Attack is an attack targeting the msDS-KeyCredentialLink attribute in LDAP (Lightweight Directory Access Protocol)…Dec 29, 2023
Grey Swan GuildThe Hunt for Grey Swans — Top 15 Methods & Frameworks — #11 Red TeamingChasing Possibilities, Wild Cards and Extremes by Poking Holes in the Established ViewOct 30
0xmaniEarly Bird APC Queue Code InjectionIn this blog, we are going to see how Early bird injection works and write our code to execute the payload. To understand this blog, I…Oct 10, 2023