Red Teaming and Malware Analysis
Ctrlk
  • About
  • Red Teaming
  • Cheat Sheet
  • Active Directory 101
  • Fuzzing and Web
  • Initial Foothold
    • Browser In The Browser (BITB) Attack
    • Phishing with Office
      • Weaponizing XLM 4.0 macros
  • Privilege Escalation (Privesc)
  • Lateral Movement (Pivoting)
  • Persistence
  • Command and Control (C&C)
  • Data Exfiltration
  • CVE & Exploits / CTF
  • Tools
  • Resources
  • Pwnage
  • Malware Analysis
  • Unpacking
  • Basic tips
  • Malware instrumentation with frida
  • Tools
  • Resources
  • Mobile
    • Tools
    • Reverse iOS ipa
    • Reverse Android APKs
    • Basic tips
    • Resources
  • IoT / Reverse / Firmware
    • Basic tips
    • Reverse IoT devices
    • Tools
    • Resources
Powered by GitBook
On this page

Was this helpful?

  1. Initial Foothold

Phishing with Office

Weaponizing XLM 4.0 macros
PreviousBrowser In The Browser (BITB) AttackNextWeaponizing XLM 4.0 macros

Was this helpful?