A simple Linux bash script to automate some mundane Linux OS tasks found at our Github.
Page redirects to our GitHub.com.
Simple Linux chained commands that help the uses of configuring IP chains on your Linux system.
Read MoreScript used to automate the addition of an email account through the registry to the user's computer.
View on GitHubThis is a picture snapshot anyone can use to query the Internet at large for keywords of interest. This is part of a basic skill of intelligence gathering that anyone can use.
View snapshotThis is an example of advance threat emulation and the use of Splunk to threat hunt for the malicious IOCs and IOAs.
Read MoreThe Vectr is an open-source platform for red teaming and blue teaming assessments to track their internal operations to plan, execute, and assess their attack simulations.
View on YouTubeNew methods of effective training can provide users with practical advice in a topically focused software-based training session that takes less than 10 minutes.
Read more on ProofPoint siteTechnological holes account for a great number of the successful break-ins, but people do their share, as well.
Read moreOSCP - Win32 Exploit Development HD (old) video going over attack paths and exploit development for your OSCP course.
View on YouTubeAn introduction to Covenant C2. Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers.
View on YouTubeIn 2024 I volunteered as a red teamer to stress test Cybersecurity teams at a national conference. Here is my video on how I resolved the challenge to quality for the event and become a Red Teamer for one day.
View on YouTubeAn old video on Cobalt Strike functionality, usage, getting reverse shell, and much more. Russian subtitles I am not responsible for.
View on YouTubeLinux essentials for learning about the distro and usage of Linux commands.
Bookmark this linkLearn from scratch how to attack and defend your Microsoft Windows Active Directory domains
Bookmark this linkBuild on the offensive ethical hacking course to advance your hacking skills with evasion and Active Directory attacks
Bookmark this linkQuick intro to Kerberoasting in Windows for Active Directory
Bookmark this linkTry exploiting the MS17-010 with this quick exercise.
Bookmark this linkWelcome to the virtual museum dedicated to the rich history of malware.
Bookmark this link