Red Team Notes
search
Ctrlk
  • What is ired.team notes?
  • Pinned
    • Pentesting Cheatsheetschevron-right
    • Active Directory & Kerberos Abusechevron-right
  • offensive security
    • Red Team Infrastructurechevron-right
      • HTTP Forwarders / Relays
      • SMTP Forwarders / Relays
      • Phishing with Modlishka Reverse HTTP Proxy
      • Automating Red Team Infrastructure with Terraform
      • Cobalt Strike 101
      • Powershell Empire 101
      • Spiderfoot 101 with Kali using Docker
    • Initial Accesschevron-right
    • Code Executionchevron-right
    • Code & Process Injectionchevron-right
    • Defense Evasionchevron-right
    • Enumeration and Discoverychevron-right
    • Privilege Escalationchevron-right
    • Credential Access & Dumpingchevron-right
    • Lateral Movementchevron-right
    • Persistencechevron-right
    • Exfiltrationchevron-right
  • reversing, forensics & misc
    • Internalschevron-right
    • Cloudchevron-right
    • Neo4j
    • Dump Virtual Box Memory
    • AES Encryption Using Crypto++ .lib in Visual Studio C++
    • Reversing Password Checking Routine
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. offensive security

Red Team Infrastructure

HTTP Forwarders / Relayschevron-rightSMTP Forwarders / Relayschevron-rightPhishing with Modlishka Reverse HTTP Proxychevron-rightAutomating Red Team Infrastructure with Terraformchevron-rightCobalt Strike 101chevron-rightPowershell Empire 101chevron-rightSpiderfoot 101 with Kali using Dockerchevron-right
PreviousAbusing Trust Account$: Accessing Resources on a Trusted Domain from a Trusting Domainchevron-leftNextHTTP Forwarders / Relayschevron-right

Last updated 7 years ago