Overview
Posts in this series will cover offensive red teaming tools, TTPs, and research.
Posts
- Obfuscating API Patches to Bypass New Windows Defender Behavior Signatures
- Extracting Credentials From Windows Logs
- How to Leverage PowerShell Profiles for Lateral Movement
- How to Emulate a Ransomware Attack
- How to Leverage Internal Proxies for Lateral Movement, Firewall Evasion, and Trust Exploitation
- Credential Harvesting with PowerShell and SpecterInsight
- Automating a Local Portscan
- Persistence with WMI Event Subscription and PowerShell Cradles
- New AMSI Bypass Using CLR Hooking