{"version":1,"pages":[{"id":"kzTlst3tKo255yz4YpDi","title":"Welcome","pathname":"/","siteSpaceId":"sitesp_Znnhy"},{"id":"yAH0ZLKI8rgFBNT5ojCL","title":"Adversary Emulation Guide","pathname":"/documentation/adversary-emulation-guide","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"DOCUMENTATION"}]},{"id":"I54mwtGTHzT1G2FIyXfh","title":"Red Team Operations Framework","pathname":"/documentation/red-team-operations-framework","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"DOCUMENTATION"}]},{"id":"A5GBvw9TTtiSFz1PNYp3","title":"Purple Team Operations","pathname":"/documentation/purple-team-operations","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"DOCUMENTATION"}]},{"id":"cK1MzOybVyfuz2dHCGfm","title":"The first 90 days of a new Red Team","pathname":"/documentation/the-first-90-days-of-a-new-red-team","siteSpaceId":"sitesp_Znnhy","description":"This article explores key strategies, governance practices, process design, team structure, and operational focus areas that will guide a Red Team lead through this initial phase.","breadcrumbs":[{"label":"DOCUMENTATION"}]},{"id":"N3UfhDVtOGS3C5X8ywd6","title":"Command and Control","pathname":"/red-team-infrastructure/command-and-control","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"Red Team Infrastructure"}]},{"id":"eB5THyI8XOiKklih7MMi","title":"C2 Redirectors Part.1","pathname":"/red-team-infrastructure/command-and-control/c2-redirectors-part.1","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"Red Team Infrastructure"},{"label":"Command and Control"}]},{"id":"08oD1aGW2Qgo1bS0dM4C","title":"Defense Evasion","pathname":"/offensive-security/defense-evasion","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"}]},{"id":"fYNwuZhY0ME7Js0mHkWn","title":"Simple Shellcode Runner in Rust","pathname":"/offensive-security/defense-evasion/simple-shellcode-runner-in-rust","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Defense Evasion"}]},{"id":"t08hGnefMMWAS0dadQ98","title":"Pass the Hash Attack with Mimikatz and PsExec","pathname":"/offensive-security/defense-evasion/pass-the-hash-attack-with-mimikatz-and-psexec","siteSpaceId":"sitesp_Znnhy","description":"","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Defense Evasion"}]},{"id":"EhzTW6IRJm7OwnkjK9n1","title":"Direct Syscall Execution in Windows","pathname":"/offensive-security/defense-evasion/direct-syscall-execution-in-windows","siteSpaceId":"sitesp_Znnhy","description":"","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Defense Evasion"}]},{"id":"deeMPLkt40lHXgLtc5Qq","title":"Hookchain Technique Introduction by Helvio Júnior (M4v3r1ck)","pathname":"/offensive-security/defense-evasion/hookchain-technique-introduction-by-helvio-junior-m4v3r1ck","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Defense Evasion"}]},{"id":"WycDakTDvBHwsbQOx2GT","title":"Probabilistic Call Stack: A Deep Dive into Non-Deterministic Execution Paths","pathname":"/offensive-security/defense-evasion/probabilistic-call-stack-a-deep-dive-into-non-deterministic-execution-paths","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Defense Evasion"}]},{"id":"zRwGUIvxdvHKpgGdgqms","title":"AMSI Bypass - Neutralizing the Microsoft Antimalware Scan Interface","pathname":"/offensive-security/defense-evasion/amsi-bypass-neutralizing-the-microsoft-antimalware-scan-interface","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Defense Evasion"}]},{"id":"VAUbFw7al7Xr4cp4gVaN","title":"ETW Bypass - Blinding Windows Telemetry","pathname":"/offensive-security/defense-evasion/etw-bypass-blinding-windows-telemetry","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Defense Evasion"}]},{"id":"Tb5MytrtPHLKuOuRvZo9","title":"Indirect Syscalls — Preserving a Legitimate Stack Trace","pathname":"/offensive-security/defense-evasion/indirect-syscalls-preserving-a-legitimate-stack-trace","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Defense Evasion"}]},{"id":"EqWwiNX6jxdmb2Dk382g","title":"API Unhooking — Restoring ntdll to a Clean State","pathname":"/offensive-security/defense-evasion/api-unhooking-restoring-ntdll-to-a-clean-state","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Defense Evasion"}]},{"id":"gHgpBKVV6ta0OKZ0bJsy","title":"Process Hollowing — Gutting Legitimate Processes","pathname":"/offensive-security/defense-evasion/process-hollowing-gutting-legitimate-processes","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Defense Evasion"}]},{"id":"97Ddqwtp7StlI6gCxnS4","title":"Reflective DLL Injection — DLLs That Load Themselves","pathname":"/offensive-security/defense-evasion/reflective-dll-injection-dlls-that-load-themselves","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Defense Evasion"}]},{"id":"cVp8E5a62kQSOaHEnn2i","title":"PPID Spoofing — Forging the Process Tree","pathname":"/offensive-security/defense-evasion/ppid-spoofing-forging-the-process-tree","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Defense Evasion"}]},{"id":"deTcxnYmKZ7b00tTmbju","title":"Token Impersonation — Identity Theft on Windows","pathname":"/offensive-security/defense-evasion/token-impersonation-identity-theft-on-windows","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Defense Evasion"}]},{"id":"c4CUiYJ8wjIVgIjcjUD9","title":"Shellcode Obfuscation — Hiding Payloads from Static Detection","pathname":"/offensive-security/defense-evasion/shellcode-obfuscation-hiding-payloads-from-static-detection","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Defense Evasion"}]},{"id":"Ze9mzOwos1fapAN58JnH","title":"APC Injection — Execution via Asynchronous Procedure Call Queues","pathname":"/offensive-security/defense-evasion/apc-injection-execution-via-asynchronous-procedure-call-queues","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Defense Evasion"}]},{"id":"FXIKQlsENakEPTWlrVzn","title":"Heaven's Gate — Calling 64-bit Code from a 32-bit Process","pathname":"/offensive-security/defense-evasion/heavens-gate-calling-64-bit-code-from-a-32-bit-process","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Defense Evasion"}]},{"id":"ruK8mCtcM88buv6Lyou6","title":"Sleep Obfuscation — Encrypting Beacons During Rest","pathname":"/offensive-security/defense-evasion/sleep-obfuscation-encrypting-beacons-during-rest","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Defense Evasion"}]},{"id":"qILqXlwreRV8kqCJYQxo","title":"Credential Access","pathname":"/offensive-security/credential-access","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"}]},{"id":"FgFrqaxhXpP4FjhyOAT0","title":"Dumping LSASS with Direct Syscalls","pathname":"/offensive-security/credential-access/dumping-lsass-with-direct-syscalls","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Credential Access"}]},{"id":"VXhembuXQqqIC2Y4CCWA","title":"Windows Internals and API","pathname":"/offensive-security/windows-internals-and-api","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"}]},{"id":"JwA5I0Tv7ejHZgTkOg8C","title":"Building Backdoors with Alternative Socket with lib-nosa (No Socket API)","pathname":"/offensive-security/windows-internals-and-api/building-backdoors-with-alternative-socket-with-lib-nosa-no-socket-api","siteSpaceId":"sitesp_Znnhy","description":"Alternative implementation of winsock2 using AFD.sys for socket realization. Still improving!","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Windows Internals and API"}]},{"id":"dyLUyMzcXtjs2wLjHvi5","title":"Windows API Hashing to Malware","pathname":"/offensive-security/windows-internals-and-api/windows-api-hashing-to-malware","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Windows Internals and API"}]},{"id":"1UtCmwA5pN1mU4wNXTTl","title":"Detection of Hooked Syscalls in ntdll.dll","pathname":"/offensive-security/windows-internals-and-api/detection-of-hooked-syscalls-in-ntdll.dll","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Windows Internals and API"}]},{"id":"4ORb8rIKyz6hcBWX3zLe","title":"Credential Exposure in Memory","pathname":"/offensive-security/windows-internals-and-api/credential-exposure-in-memory","siteSpaceId":"sitesp_Znnhy","description":"A Deep Dive into SecureString, PowerShell, and Windows Process Internals","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Windows Internals and API"}]},{"id":"gCXHVIRgpdHWZGHsodUJ","title":"Privilege Escalation","pathname":"/offensive-security/privilege-escalation","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"}]},{"id":"Pgf8rxilgjgFY3iRSfXb","title":"Windows UAC Bypass Techniques","pathname":"/offensive-security/privilege-escalation/windows-uac-bypass-techniques","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Privilege Escalation"}]},{"id":"UVkp1a2GWzu4ISoyhS5z","title":"Obtaining SYSTEM privilege via a vulnerable driver using a Userland program","pathname":"/offensive-security/privilege-escalation/obtaining-system-privilege-via-a-vulnerable-driver-using-a-userland-program","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Privilege Escalation"}]},{"id":"I8e61mC8RELEcyRy9ISR","title":"Malware Development","pathname":"/offensive-security/malware-development","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"}]},{"id":"YsThGAd9ld0fuZTdmJuu","title":"Chrome Password Dumper: Guide to Browser Password Recovery","pathname":"/offensive-security/malware-development/chrome-password-dumper-guide-to-browser-password-recovery","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Malware Development"}]},{"id":"jCQ82lcd43sDhFhMyxhE","title":"Initial Access","pathname":"/offensive-security/initial-access","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"}]},{"id":"u8jKxT3ojTwgivBFzHo6","title":"Weaponized LNK Files for Initial Access and Delivery","pathname":"/offensive-security/initial-access/weaponized-lnk-files-for-initial-access-and-delivery","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Initial Access"}]},{"id":"Me3DW4fez3NrLib9brcu","title":"Persistence","pathname":"/offensive-security/persistence","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"}]},{"id":"wZx5nCZneCNHMOJWoQxT","title":"Advanced Windows Persistence: Unveiling TypeLib Hijacking with Lesser-Known CLSIDs","pathname":"/offensive-security/persistence/advanced-windows-persistence-unveiling-typelib-hijacking-with-lesser-known-clsids","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"OFFENSIVE SECURITY"},{"label":"Persistence"}]},{"id":"6Sy3HLNujksAhh5cvrJ4","title":"Offensive Artificial Intelligence","pathname":"/offensive-artificial-intelligence","siteSpaceId":"sitesp_Znnhy"},{"id":"f8ilrFSwc3EH37uLg2y0","title":"Prompt Injection 101","pathname":"/offensive-artificial-intelligence/prompt-injection-101","siteSpaceId":"sitesp_Znnhy","breadcrumbs":[{"label":"Offensive Artificial Intelligence"}]}]}