Red Team Leaders
  • Welcome
  • DOCUMENTATION
    • Adversary Emulation Guide
    • Red Team Operations Framework
    • Purple Team Operations
    • The first 90 days of a new Red Team
  • Red Team Infrastructure
    • Command and Control
      • C2 Redirectors Part.1
  • OFFENSIVE SECURITY
    • Defense Evasion
      • Simple Shellcode Runner in Rust
      • Pass the Hash Attack with Mimikatz and PsExec
      • Direct Syscall Execution in Windows
      • Hookchain Technique Introduction by Helvio Júnior (M4v3r1ck)
    • Credential Access
      • Dumping LSASS with Direct Syscalls
    • Windows Internals and API
      • Building Backdoors with Alternative Socket with lib-nosa (No Socket API)
      • Windows API Hashing to Malware
      • Detection of Hooked Syscalls in ntdll.dll
    • Privilege Escalation
      • Windows UAC Bypass Techniques
      • Obtaining SYSTEM privilege via a vulnerable driver using a Userland program
  • Offensive Artificial Intelligence
    • Prompt Injection 101
Powered by GitBook
On this page
  1. OFFENSIVE SECURITY

Defense Evasion

Simple Shellcode Runner in RustPass the Hash Attack with Mimikatz and PsExecDirect Syscall Execution in WindowsHookchain Technique Introduction by Helvio Júnior (M4v3r1ck)
PreviousC2 Redirectors Part.1NextSimple Shellcode Runner in Rust