redteam   207

« earlier    

EternalGlue part two: A rebuilt NotPetya gets its first execution outside of the lab
Interesting, using a defanged NotPetya to see how screwed a client org is. Shame they can't release it because we can't have nice things, but a good illustration technical skill of a high quality service for clients
security  hacking  pentesting  redteam 
17 days ago by asteroza
FuzzySecurity | Windows Userland Persistence Fundamentals
This tutorial will cover several techniques that can be used to gain persistent access to Windows machines. Usually this doesn't enter into play during a pentest (with the exception of red team engagements) as there is no benefit to adding it to the scope of the project. That is not to say it is not an interesting subject, both from a defensive and offensive perspective.
persistence  windows  pentest  redteam  security 
4 weeks ago by whip_lash
Twitter
Interesting, using AWS Lambda "serverless" computing for operations
amazon  redteam  from twitter_favs
5 weeks ago by kennygatdula
GitHub - nshalabi/ATTACK-Tools: Utilities for MITRE™ ATT&CK
Utilities for MITRE™ ATT&CK. Contribute to nshalabi/ATTACK-Tools development by creating an account on GitHub.
pentest  att&ck  planning  redteam 
7 weeks ago by bkinsley

« earlier    

related tags

aapl  activedirectory  ad  amazon  applicationlayer  att&ck  att&ck  attack  automation  aws  azure  blueteam  bugbounty  c#  caldera  cobaltstrike  code  credentials  credscanner  cyb632  cyb633  cybersec  cybersecurity  dataset  dcshadow  definitions  devices  digitalocean  dns  docker  electronics  email  endgame  exfiltration  exploit  github  golang  google  grimmeathook  grouppolicy  hacking  hardware  hid  homebrew  howto  ifosec  informationsecurity  infosec  infrastructure  labs  laptop  linux  list  lolbins  microsoft  mitre  msft  netsec  osint  osx  packer  pentest  pentesting  pentestlab  persistence  planning  powershell  privesc  programming  pth  purpleteam  pwntest  python  rdp  recon  redcanary  scanner  script  search  security  simulation  software  splunk  ssh  sysmon  terraform  threathunting  tls  tool  toolkit  tools  trending  ttp  uefi  vdi  virtualbox  visualization  windows 

Copy this bookmark:



description:


tags: