- Redteam🗡
https://www.xanthus.io/building-an-obfuscator-to-evade-windows-defender/
https://github.com/chr0n1k/AH2021Workshop
https://exploit.ph/external-trusts-are-evil.html
https://www.x86matthew.com/view_post?id=shared_mem_utils
https://www.edx.org/bio/daniel-gruss-4
https://www.x86matthew.com/view_post?id=windows_seagate_lpe
https://blog.sonarsource.com/onedev-remote-code-execution/
https://www.synacktiv.com/publications/traces-of-windows-remote-command-execution.html
http://fuzzing.in/codelabs/finding_security_vulnerabilities/index.html?index=..%2F..index#0
https://www.golinuxcloud.com/embed-payload-in-pdf/
https://mgeeky.tech/backdooring-office-structures-part-1-oldschool/
https://www.wiz.io/blog/the-cloud-has-an-isolation-problem-postgresql-vulnerabilities
https://github.com/p0dalirius/windows-coerced-authentication-methods
https://pentestlaboratories.com/2021/06/01/threat-hunting-amsi-bypasses
https://fluidattacks.com/blog/hevd-smep-bypass
https://morph3sec.com/Cheat-Sheets/Windows-Red-Team-Cheat-Sheet
https://portswigger.net/research/alert-is-dead-long-live-print
https://infosecwriteups.com/reflected-xss-through-insecure-dynamic-loading-dbf4d33611e0
https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets
https://infosecwriteups.com/using-tmux-for-automating-interactive-reverse-shells-630260740af3
https://cedowens.medium.com/initial-access-checks-on-macos-531dd2d0cee6
https://antman1p-30185.medium.com/acting-red-seeing-blue-b04dd845c3dc
https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata
https://blog.projectdiscovery.io/abusing-reverse-proxies-internal-access
https://www.n00py.io/2022/03/password-spraying-rapididentity-logon-portal
https://nickzero.co.uk/automating-a-red-team-lab-part-2
https://nickzero.co.uk/automating-a-red-team-lab
https://www.praetorian.com/blog/red-team-privilege-escalation-rbcd-based-privilege-escalation-part-2
https://hackersploit.org/windows-red-team-exploitation-techniques
https://tbhaxor.com/exploiting-insecure-docker-registry
https://red.0xbad53c.com/red-team-operations/initial-access/webshells/iis-soap
https://www.trustedsec.com/blog/persisting-xss-with-iframe-traps
https://dhiyaneshgeek.github.io/red/teaming/2022/04/28/reconnaissance-red-teaming
https://www.solomonsklash.io/stealing-tokens-with-malicious-driver.html
https://vanmieghem.io/blueprint-for-evading-edr-in-2022
https://linxz.tech/post/hevd/2022-05-14-hevd3-stackbufferoverflow
https://infosecwriteups.com/bypassing-waf-to-weaponize-a-stored-xss-ff9963c421ee
https://lolbas-project.github.io/lolbas/OtherMSBinaries/Wsl
https://alice.climent-pommeret.red/posts/a-syscall-journey-in-the-windows-kernel
https://www.horizon3.ai/red-team-blog-cve-2022-28219
https://www.horizon3.ai/red-team-blog-cve-2022-28219
https://www.x86matthew.com/view_post?id=add_exe_import
https://github.com/chip-red-pill/MicrocodeDecryptor
https://github.com/d30sa1/RootKits-List-Download
https://github.com/foospidy/payloads
https://github.com/Twigonometry/buffer-overflow-scripts
https://github.com/hashishrajan/cloud-security-vulnerabilities
https://github.com/RistBS/Awesome-RedTeam-Cheatsheet
https://github.com/RoseSecurity/Red-Teaming-TTPs
https://github.com/mgeeky/Penetration-Testing-Tools/
We are working on Blue team place huge information and links coming :]