Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked Red Team Playbooks | cutting-edge open-source tools, techniques and procedures


dEEpEst

Recommended Posts

This repository contains cutting-edge open-source tools, techniques and procedures that will help you during your Red Team engagements.

 

I tried as good as I can to all resources I used in this projects. If I used code or other resources from you and you are not yet listed in the shoutout box below, feel free to reach out to me and I will add you asap.

Table of Contents

  • Kickoff
  • Operations
  • 1 Reconnaissance
  • 1.1 Scanning and Enumeration
  • 2 Weaponization
  • 2.1 Initial Access
  • 3 Delivery
  • 4 Exploitation
  • 4.1 Defense Evasion
  • 4.2 Credential Dumping
  • 4.3 Privilege Escalation
  • 4.4 Lateral Movement
  • 5 Installation
  • 5.1 Persistence
  • 5.2 Situational Awareness
  • 6 Command-and-Control
  • 7 Actions-on-Objective
  • 7.1 Post Exploitation
  • 7.2 Exfiltration

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.