DEV Community

# redteam

Adversary emulation, advanced persistent threat simulation, and red team operations.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Password Cracking Project #1 – From Privilege Escalation to Hashcat

Password Cracking Project #1 – From Privilege Escalation to Hashcat

5
Comments
1 min read
My Next Step in Cybersecurity: Internship at Young Cyber Knights Foundation

My Next Step in Cybersecurity: Internship at Young Cyber Knights Foundation

1
Comments
1 min read
Stop Googling Reverse Shells: Meet oh-my-shells

Stop Googling Reverse Shells: Meet oh-my-shells

Comments
5 min read
""Rediska" - a bad man" - Redis in Kubernetes Ecosystems: From Configuration Leaks to Lateral Movement in Red Team.

""Rediska" - a bad man" - Redis in Kubernetes Ecosystems: From Configuration Leaks to Lateral Movement in Red Team.

11
Comments 2
22 min read
From Recon to Exfiltration: A Step-by-Step Red Team Exercise in Azure and AWS

From Recon to Exfiltration: A Step-by-Step Red Team Exercise in Azure and AWS

Comments
3 min read
The Role of Termux in Red Team vs Blue Team Exercises

The Role of Termux in Red Team vs Blue Team Exercises

Comments
3 min read
HackTeam.RED: From API Keys to Full Infrastructure Compromise

HackTeam.RED: From API Keys to Full Infrastructure Compromise

20
Comments 12
4 min read
SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

1
Comments
4 min read
The intel Management Engine:~The Ghost in your machine

The intel Management Engine:~The Ghost in your machine

2
Comments
3 min read
SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

1
Comments
2 min read
Hack Smarter, Not Harder: Engineering a Self Documenting Shell Framework

Hack Smarter, Not Harder: Engineering a Self Documenting Shell Framework

1
Comments
5 min read
🧨 Stop manually pentesting. I built an AI that thinks like a red team — and it’s nearly ready.

🧨 Stop manually pentesting. I built an AI that thinks like a red team — and it’s nearly ready.

1
Comments
1 min read
SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

1
Comments
3 min read
From PEB to WinExec: Manual Shellcode Execution Without Imports on Windows x64

From PEB to WinExec: Manual Shellcode Execution Without Imports on Windows x64

2
Comments
12 min read
Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

1
Comments
6 min read
What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

Comments
6 min read
Think you can outsmart a WAF? Try SafeLine!

Think you can outsmart a WAF? Try SafeLine!

6
Comments
1 min read
New Step Is Here..!

New Step Is Here..!

Comments
1 min read
From Code to Capital: The Hacker Mindset Revolutionizing Algorithmic Trading

From Code to Capital: The Hacker Mindset Revolutionizing Algorithmic Trading

Comments
3 min read
Exploring the GenAI Red Teaming Guide

Exploring the GenAI Red Teaming Guide

9
Comments 1
2 min read
Linux Privilege Escalation: Techniques and Examples

Linux Privilege Escalation: Techniques and Examples

1
Comments
5 min read
How to Explore an Exposed .git

How to Explore an Exposed .git

7
Comments 1
4 min read
Understanding the MITRE ATT&CK Platform: A Valuable Resource for Cybersecurity Professionals

Understanding the MITRE ATT&CK Platform: A Valuable Resource for Cybersecurity Professionals

Comments
2 min read
Sliver and Cursed Chrome for Post Exploitation

Sliver and Cursed Chrome for Post Exploitation

6
Comments
5 min read
Docker image recon

Docker image recon

Comments
3 min read
loading...