Red Team Leaders
search
⌘Ctrlk
Red Team Leaders
  • Welcome
  • DOCUMENTATION
    • Adversary Emulation Guide
    • Red Team Operations Framework
    • Purple Team Operations
    • The first 90 days of a new Red Team
  • Red Team Infrastructure
    • Command and Control
  • OFFENSIVE SECURITY
    • Defense Evasion
      • Simple Shellcode Runner in Rust
      • Pass the Hash Attack with Mimikatz and PsExec
      • Direct Syscall Execution in Windows
      • Hookchain Technique Introduction by Helvio Júnior (M4v3r1ck)
      • Probabilistic Call Stack: A Deep Dive into Non-Deterministic Execution Paths
    • Credential Access
    • Windows Internals and API
    • Privilege Escalation
    • Malware Development
    • Initial Access
  • Offensive Artificial Intelligence
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. OFFENSIVE SECURITY

Defense Evasion

Simple Shellcode Runner in Rustchevron-rightPass the Hash Attack with Mimikatz and PsExecchevron-rightDirect Syscall Execution in Windowschevron-rightHookchain Technique Introduction by Helvio Júnior (M4v3r1ck)chevron-rightProbabilistic Call Stack: A Deep Dive into Non-Deterministic Execution Pathschevron-right
PreviousC2 Redirectors Part.1chevron-leftNextSimple Shellcode Runner in Rustchevron-right