Red Teaming and Malware Analysis
search
⌘Ctrlk
Red Teaming and Malware Analysis
  • About
  • Red Teaming
  • Cheat Sheet
  • Active Directory 101
  • Fuzzing and Web
  • Initial Foothold
  • Privilege Escalation (Privesc)
  • Lateral Movement (Pivoting)
  • Persistence
  • Command and Control (C&C)
  • Data Exfiltration
  • CVE & Exploits / CTF
  • Tools
    • Intel
    • OSINT
    • DNS
    • WEB
    • Infrastructure and Network
      • Scan and Discovery
      • Automated Scanners
      • Misc
      • Active Directory
      • Cloud & Azure
      • Command and Control (C&C)
      • (De)serialization
      • Lateral Movement
      • Powershell
    • Privilege Escalation
    • Exfiltration
    • Persistence
    • Password & Cracking
    • Static Code Analysis
    • Reporting
  • Resources
  • Pwnage
  • Malware Analysis
  • Unpacking
  • Basic tips
  • Malware instrumentation with frida
  • Tools
  • Resources
  • Mobile
    • Tools
    • Reverse iOS ipa
    • Reverse Android APKs
    • Basic tips
    • Resources
  • IoT / Reverse / Firmware
    • Basic tips
    • Reverse IoT devices
    • Tools
    • Resources
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Tools

Infrastructure and Network

Scan and Discoverychevron-rightAutomated Scannerschevron-rightMiscchevron-rightActive Directorychevron-rightCloud & Azurechevron-rightCommand and Control (C&C)chevron-right(De)serializationchevron-rightLateral Movementchevron-rightPowershellchevron-right
PreviousJWTchevron-leftNextScan and Discoverychevron-right

Last updated 4 years ago