Red Team Leaders
search
⌘Ctrlk
Red Team Leaders
  • Welcome
    • Adversary Emulation Guide
    • Red Team Operations Framework
    • Purple Team Operations
    • The first 90 days of a new Red Team
    • Command and Control
    • Defense Evasion
      • Simple Shellcode Runner in Rust
      • Pass the Hash Attack with Mimikatz and PsExec
      • Direct Syscall Execution in Windows
      • Hookchain Technique Introduction by Helvio Júnior (M4v3r1ck)
      • Probabilistic Call Stack: A Deep Dive into Non-Deterministic Execution Paths
      • AMSI Bypass - Neutralizing the Microsoft Antimalware Scan Interface
      • ETW Bypass - Blinding Windows Telemetry
      • Indirect Syscalls — Preserving a Legitimate Stack Trace
      • API Unhooking — Restoring ntdll to a Clean State
      • Process Hollowing — Gutting Legitimate Processes
      • Reflective DLL Injection — DLLs That Load Themselves
      • PPID Spoofing — Forging the Process Tree
      • Token Impersonation — Identity Theft on Windows
      • Shellcode Obfuscation — Hiding Payloads from Static Detection
      • APC Injection — Execution via Asynchronous Procedure Call Queues
      • Heaven's Gate — Calling 64-bit Code from a 32-bit Process
      • Sleep Obfuscation — Encrypting Beacons During Rest
    • Credential Access
    • Windows Internals and API
    • Privilege Escalation
    • Malware Development
    • Initial Access
    • Persistence
  • Offensive Artificial Intelligence
gitbookPowered by GitBookgitbook
  1. OFFENSIVE SECURITY

Defense Evasion

Simple Shellcode Runner in Rustchevron-rightPass the Hash Attack with Mimikatz and PsExecchevron-rightDirect Syscall Execution in Windowschevron-rightHookchain Technique Introduction by Helvio Júnior (M4v3r1ck)chevron-rightProbabilistic Call Stack: A Deep Dive into Non-Deterministic Execution Pathschevron-rightAMSI Bypass - Neutralizing the Microsoft Antimalware Scan Interfacechevron-rightETW Bypass - Blinding Windows Telemetrychevron-rightIndirect Syscalls — Preserving a Legitimate Stack Tracechevron-rightAPI Unhooking — Restoring ntdll to a Clean Statechevron-rightProcess Hollowing — Gutting Legitimate Processeschevron-rightReflective DLL Injection — DLLs That Load Themselveschevron-rightPPID Spoofing — Forging the Process Treechevron-rightToken Impersonation — Identity Theft on Windowschevron-rightShellcode Obfuscation — Hiding Payloads from Static Detectionchevron-rightAPC Injection — Execution via Asynchronous Procedure Call Queueschevron-rightHeaven's Gate — Calling 64-bit Code from a 32-bit Processchevron-rightSleep Obfuscation — Encrypting Beacons During Restchevron-right
PreviousC2 Redirectors Part.1chevron-leftNextSimple Shellcode Runner in Rustchevron-right