DEV Community

# redteam

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Stop Googling Reverse Shells: Meet oh-my-shells

Stop Googling Reverse Shells: Meet oh-my-shells

Comments
5 min read
From Recon to Exfiltration: A Step-by-Step Red Team Exercise in Azure and AWS

From Recon to Exfiltration: A Step-by-Step Red Team Exercise in Azure and AWS

Comments
3 min read
The Role of Termux in Red Team vs Blue Team Exercises

The Role of Termux in Red Team vs Blue Team Exercises

Comments
3 min read
HackTeam.RED: From API Keys to Full Infrastructure Compromise

HackTeam.RED: From API Keys to Full Infrastructure Compromise

19
Comments 12
4 min read
SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

1
Comments
4 min read
The intel Management Engine:~The Ghost in your machine

The intel Management Engine:~The Ghost in your machine

2
Comments
3 min read
SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

1
Comments
2 min read
Hack Smarter, Not Harder: Engineering a Self Documenting Shell Framework

Hack Smarter, Not Harder: Engineering a Self Documenting Shell Framework

1
Comments
5 min read
🧨 Stop manually pentesting. I built an AI that thinks like a red team — and it’s nearly ready.

🧨 Stop manually pentesting. I built an AI that thinks like a red team — and it’s nearly ready.

1
Comments
1 min read
SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

1
Comments
3 min read
From PEB to WinExec: Manual Shellcode Execution Without Imports on Windows x64

From PEB to WinExec: Manual Shellcode Execution Without Imports on Windows x64

2
Comments
12 min read
Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

1
Comments
6 min read
New Step Is Here..!

New Step Is Here..!

Comments
1 min read
What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

Comments
6 min read
Think you can outsmart a WAF? Try SafeLine!

Think you can outsmart a WAF? Try SafeLine!

6
Comments
1 min read
From Code to Capital: The Hacker Mindset Revolutionizing Algorithmic Trading

From Code to Capital: The Hacker Mindset Revolutionizing Algorithmic Trading

Comments
3 min read
Exploring the GenAI Red Teaming Guide

Exploring the GenAI Red Teaming Guide

9
Comments 1
2 min read
Linux Privilege Escalation: Techniques and Examples

Linux Privilege Escalation: Techniques and Examples

1
Comments
5 min read
How to Explore an Exposed .git

How to Explore an Exposed .git

7
Comments 1
4 min read
Understanding the MITRE ATT&CK Platform: A Valuable Resource for Cybersecurity Professionals

Understanding the MITRE ATT&CK Platform: A Valuable Resource for Cybersecurity Professionals

Comments
2 min read
Sliver and Cursed Chrome for Post Exploitation

Sliver and Cursed Chrome for Post Exploitation

6
Comments
5 min read
Docker image recon

Docker image recon

Comments
3 min read
Kernel module HTTP request sniffing

Kernel module HTTP request sniffing

5
Comments
2 min read
Process hiding in Linux

Process hiding in Linux

1
Comments
1 min read
PrivEsc with LD_PRELOAD

PrivEsc with LD_PRELOAD

2
Comments
1 min read
loading...