đź”´ Official Blog on R3d-Buck3t
- Red Teaming in Cloud: Leverage Azure FrontDoor CDN for C2 Redirectors
- Abusing Dynamic Groups in AzureAD [Part 1]
- Red Teaming in the Cloud: Installing Mythic C2 on Azure VM
- Red Teaming in the Cloud: Deploying Azure VMs for C2 Infrastructure
- Virtual Host Enumeration for Uncovering Hidden Subdomains
- CrackMapExec in Action: Enumerating Windows Networks (Part 2)
- CrackMapExec in Action: Enumerating Windows Networks (Part 1)
- Privilege Escalation with Insecure Windows Service Permissions
- Certificate-based Authentication over WinRM
- How to Abuse Resource-Based Constrained Delegation to Gain Unauthorized Access
Â
This repo is a collection of tools and commands for pentesting and red teaming assessments
🔎 View the Wiki
- Web Application Security
- Window & Active Directory
- Cloud Security
- Netowrk Security
- Wireless Security
- Vulnerability Research
- Misc
- Resources
- Training
updating soon ....
Web Application Security | Network Pentesting | Active Directory |
Windows | Linux | Cloud Security |
Wireless | Vulnerability Research | Misc |