Casual McDonald's Employee Scriptorium
search
Ctrlk
BlogMemesGitHubAbout
  • root@JesusCries
  • ⛩️Red Teaming
    • Methodology
    • Red Team Infrastructure
    • Initial Access
    • Reconnaissance
    • Lateral Movement
    • Post-Exploitationchevron-right
    • Evasionchevron-right
    • Offensive Developmentchevron-right
    • Command & Control (C2)chevron-right
    • Miscellaneouschevron-right
      • Interesting Read
      • Certification Reviewschevron-right
  • 🧊Active Directory & Pentest
    • Check List
  • 🚩CTF Writeups
    • Reverse Engineeringchevron-right
    • Binary Exploitationchevron-right
  • 🤡Clown Chronicles
    • About Me
    • Blogschevron-right
    • Projects
    • Memes
    • Others
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. ⛩️Red Teamingchevron-right
  2. Miscellaneous

Interesting Read

hashtag
Red Team Methodology

  • Hang Fire: Challenging our Mental Model of Initial Accessarrow-up-right

  • What I’ve Learned in Over a Decade of “Red Teaming”arrow-up-right

  • How to Create an Internal/Corporate Red Teamarrow-up-right

  • The Problems With Today's Red Teamingarrow-up-right

  • The Future of Adversaries is Software Developmentarrow-up-right

  • What is the CISO Experience in a Red Team Exercise?arrow-up-right

  • DLS 2024 - RedTeam Fails - "Oops my bad I ruined the operation"arrow-up-right

  • [D24] Circling Dragons: Red Team Lessons From Modern Breaches - Jason Langarrow-up-right

  • Engagement Guide: How to Prepare for Your Purple Teamarrow-up-right

hashtag
Technical Reference

  • CISA Red Team Engagement Report 1arrow-up-right

  • CISA Red Team Engagement Report 2arrow-up-right

  • Adversary Emulation Planarrow-up-right

hashtag
Malware Development

  • Development Tradecraft DOs and DON'Tsarrow-up-right

PreviousMiscellaneouschevron-leftNextCertification Reviewschevron-right

Last updated 1 year ago

  • Red Team Methodology
  • Technical Reference
  • Malware Development