Forem

# redteam

Adversary emulation, advanced persistent threat simulation, and red team operations.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

1
Comments
2 min read
SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

1
Comments
4 min read
SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

1
Comments
3 min read
From PEB to WinExec: Manual Shellcode Execution Without Imports on Windows x64
Cover image for From PEB to WinExec: Manual Shellcode Execution Without Imports on Windows x64

From PEB to WinExec: Manual Shellcode Execution Without Imports on Windows x64

2
Comments
12 min read
Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312
Cover image for Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

1
Comments
6 min read
What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security
Cover image for What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

Comments
6 min read
Think you can outsmart a WAF? Try SafeLine!

Think you can outsmart a WAF? Try SafeLine!

6
Comments
1 min read
New Step Is Here..!
Cover image for New Step Is Here..!

New Step Is Here..!

Comments
1 min read
From Code to Capital: The Hacker Mindset Revolutionizing Algorithmic Trading
Cover image for From Code to Capital: The Hacker Mindset Revolutionizing Algorithmic Trading

From Code to Capital: The Hacker Mindset Revolutionizing Algorithmic Trading

1
Comments
3 min read
Exploring the GenAI Red Teaming Guide

Exploring the GenAI Red Teaming Guide

9
Comments 1
2 min read
Linux Privilege Escalation: Techniques and Examples

Linux Privilege Escalation: Techniques and Examples

1
Comments
5 min read
How to Explore an Exposed .git
Cover image for How to Explore an Exposed .git

How to Explore an Exposed .git

7
Comments 1
4 min read
Understanding the MITRE ATT&CK Platform: A Valuable Resource for Cybersecurity Professionals

Understanding the MITRE ATT&CK Platform: A Valuable Resource for Cybersecurity Professionals

Comments
2 min read
Sliver and Cursed Chrome for Post Exploitation
Cover image for Sliver and Cursed Chrome for Post Exploitation

Sliver and Cursed Chrome for Post Exploitation

6
Comments
5 min read
Docker image recon
Cover image for Docker image recon

Docker image recon

Comments
3 min read
Kernel module HTTP request sniffing
Cover image for Kernel module HTTP request sniffing

Kernel module HTTP request sniffing

5
Comments
2 min read
Process hiding in Linux
Cover image for Process hiding in Linux

Process hiding in Linux

1
Comments
1 min read
PrivEsc with LD_PRELOAD
Cover image for PrivEsc with LD_PRELOAD

PrivEsc with LD_PRELOAD

2
Comments
1 min read
Exploiting unverified JWT signatures
Cover image for Exploiting unverified JWT signatures

Exploiting unverified JWT signatures

7
Comments
2 min read
loading...