This is publicly accessible personal notes at https://ired.team about my pentesting / red teaming experiments in a controlled environment that involve playing with various tools and techniques used by penetration testers, red teams and advanced adversaries.
The following sub-pages of this page will explore some of the common offensive security techniques involving gaining code execution, lateral movement, persistence and more.
The goal of this project is simple - read other researchers work, execute some common/uncommon attacking techniques in a lab environment and:
understand how the attacks can be performed
write code to further the understanding of some of the tools and techniques
see what most common artifacts they leave behind
try out various industry tools and become more profficient in using them
make any notes as a reference for the future
Follow me on twitter: