Jump to content
We do not tolerate any form of fraud, and we take this issue very seriously. Fuck Right off!

The Red Team Guide


SWAT
 Share

Recommended Posts

A pratical guide for Red Teams and Offensive Security

Table of Content:

  • Chapter 1: Red Teaming and Red Teams Overview
  • Chapter 2: Phase 1: Open-Source Intelligence (OSINT) Reconnaissance
  • Chapter 3: Phase 2: Enumeration
  • Chapter 4: Phase 2a: External Recon 
  • Chapter 5: Phase 2b: Internal Recon
  • Chapter 6: Social Engineering Attacks (Spear phishing)
  • Chapter 7: Bypassing Windows User Account Control (UAC)
  • Chapter 8: Powershell For Red Teams
  • Chapter 9: Lateral Movement
  • Chapter 10: Network Domination & Persistence
  • Chapter 11: Evasion & Obfuscation Techniques
  • Chapter 12: Data Exfiltration 
  • Chapter 13: Attacking Linux/Unix Environments 
  • Chapter 14: Attacking ICS/SCADA
  • Chapter 15: Privilege Escalation
  • Chapter 16: Virtualization Attacks
  • Further Reading

 

Download:

 

This is the hidden content, please

Link to comment
Share on other sites

  • 4 weeks later...
On 12/13/2021 at 3:00 PM, SWAT said:

A pratical guide for Red Teams and Offensive Security

Table of Content:

  • Chapter 1: Red Teaming and Red Teams Overview
  • Chapter 2: Phase 1: Open-Source Intelligence (OSINT) Reconnaissance
  • Chapter 3: Phase 2: Enumeration
  • Chapter 4: Phase 2a: External Recon 
  • Chapter 5: Phase 2b: Internal Recon
  • Chapter 6: Social Engineering Attacks (Spear phishing)
  • Chapter 7: Bypassing Windows User Account Control (UAC)
  • Chapter 8: Powershell For Red Teams
  • Chapter 9: Lateral Movement
  • Chapter 10: Network Domination & Persistence
  • Chapter 11: Evasion & Obfuscation Techniques
  • Chapter 12: Data Exfiltration 
  • Chapter 13: Attacking Linux/Unix Environments 
  • Chapter 14: Attacking ICS/SCADA
  • Chapter 15: Privilege Escalation
  • Chapter 16: Virtualization Attacks
  • Further Reading

 

Download:

 

 

Hidden Content

  • Reply to this topic to see the hidden content.

 

 

Link to comment
Share on other sites

  • 1 month later...
  • 4 weeks later...
On 12/13/2021 at 8:00 AM, SWAT said:

A pratical guide for Red Teams and Offensive Security

Table of Content:

  • Chapter 1: Red Teaming and Red Teams Overview
  • Chapter 2: Phase 1: Open-Source Intelligence (OSINT) Reconnaissance
  • Chapter 3: Phase 2: Enumeration
  • Chapter 4: Phase 2a: External Recon 
  • Chapter 5: Phase 2b: Internal Recon
  • Chapter 6: Social Engineering Attacks (Spear phishing)
  • Chapter 7: Bypassing Windows User Account Control (UAC)
  • Chapter 8: Powershell For Red Teams
  • Chapter 9: Lateral Movement
  • Chapter 10: Network Domination & Persistence
  • Chapter 11: Evasion & Obfuscation Techniques
  • Chapter 12: Data Exfiltration 
  • Chapter 13: Attacking Linux/Unix Environments 
  • Chapter 14: Attacking ICS/SCADA
  • Chapter 15: Privilege Escalation
  • Chapter 16: Virtualization Attacks
  • Further Reading

 

Download:

 

 

Hidden Content

  • Reply to this topic to see the hidden content.

 

tanks

Link to comment
Share on other sites

  • 5 weeks later...
  • 2 weeks later...
  • 5 weeks later...
  • 4 months later...

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...

Important Information

By accessing and using our website, you confirm that you have read, understood, and agree to be bound by our Privacy Policy, Terms of Use, and Guidelines, which are applicable to all visitors of our website. We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.