Overview
Posts in this series will cover offensive red teaming tools, TTPs, and research.
Posts
- How to Emulate a Ransomware Attack
- How to Leverage Internal Proxies for Lateral Movement, Firewall Evasion, and Trust Exploitation
- Credential Harvesting with PowerShell and SpecterInsight
- Automating a Local Portscan
- Persistence with WMI Event Subscription and PowerShell Cradles
- New AMSI Bypass Using CLR Hooking