Red Teaming and Malware Analysis
@sirpedrotavares
seguranca-informatica.pt
0xSI_f33d
Search…
About
Red Teaming
Cheat Sheet
Active Directory 101
Fuzzing and Web
Initial Foothold
Privilege Escalation (Privesc)
Lateral Movement (Pivoting)
Persistence
Command and Control (C&C)
Data Exfiltration
CVE & Exploits / CTF
Tools
Resources
Malware Analysis
Unpacking
Basic tips
Malware instrumentation with frida
Tools
Resources
Mobile
Tools
Reverse iOS ipa
Reverse Android APKs
Basic tips
Resources
IoT / Reverse / Firmware
Basic tips
Reverse IoT devices
Tools
Resources
Powered By
GitBook
Resources
乌云 Drops 文章在线浏览
GitHub - wietze/windows-dll-hijacking: Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.
GitHub
GitHub - quentinhardy/pytmipe: Python library and client for token manipulations and impersonations for privilege escalation on Windows
GitHub
Windows API and Impersonation Part 1 - How to get SYSTEM using Primary Tokens
zc00l blog
Process Migration - tokens stealing (like a meterpreter) ~ Кибер Кака }{}{}{
Кибер Кака }{}{}{
Red Teaming/Adversary Simulation Toolkit
Previous
Reporting
Next
Unpacking
Last modified
3mo ago
Copy link