Hello, Open World
Search
Ctrl K
Hello, Open World
Search
Ctrl K
Published
Hello, Open World
1_RTO
1. Red Teaming 101
101
0.1 SecureHomelabs
0.2_Red_Team_Workspace_Cheatsheet
0.3_Hardened_Jump_Hosts_OCI_AWS_DigitalOcean
0_README
1. Linux
2. Windows_AD
3. Web
6.1_EDR_Evasion
Recon
7. Blue_Team_Detection
8. Jump_Server_Quickstart
opensource
Clouds
0.1. Learn Cloud
0.1.2 Azure
0.1.2.1. Azure General
IAM
How does a user authenticate to the cloud?
OpenID Connect
Security Token Service
AZURE CLI Tab Completion
Azure Network
Azure Powershell
Azure REST API with Azure CLI
Built-in Permissions
Tenant, Subscription, Resource
0.1.2.2. Azure Services
Active Directory Federation Services (ADFS)
Azure API Management
Azure App Services
Azure Automation
Azure Cosmo
Azure Entra
Azure Function Apps
Azure Key Vaults
Azure Logic App
Azure Resource Manager
Azure Virtual Machine
SDKs
Azure Services
0.1.3 AWS
0.1.3.1. AWS Resources
0.1.3.2. AWS Cloud Services
Resources
0.2. Attack Cloud
0.2.1. General
0.2.1.1. Attack Clouds
0.2.1.2. Search for Credentials - Services
0.2.1.3. Search for Credentials - File
0.2.2. AWS
flaws.cloud
AWS Practice 2 -flaws2.cloud
AWS Practice - flaws.cloud
skills
skills
Tips
AWS Access Key to Web
AWS IAM
AWS Signed API Request
AWS Signing and Authenticating REST requests
0.2.2.1. AWS - Search for Creds
0.2.2.2. AWS Enumeration Process
AWS -Tools
0.2.3. Azure
PwnedLabs
0. Azure - Readme
1. Azure Blob Container to Initial Access
2. Unlock Access with Azure Key Vault
3. Azure with Bloodhound and Microsoft.Graph
4. Loot Exchange, Teams and SharePoint with GraphRunner
5. Unmask Privileged Access in Azure
6. Azure Recon to Foothold and Profit
8. Execute Azure Credential Shuffle to Achieve Objectives
skills
skills
Azure - Search for Creds!
Enumerate with credentials
Enumerate without Credentials - Inside of Virtual Machine
Tool - AADInternal
Tool - AZSubEnum - Subdomain Enum
Red Teaming
101
5_Cloud
6.1_EDR_Evasion
6_EDR
7.1_C2_Beacon_Evasion
7.2_C2_infra
7_C2
8_Reporting
Recon
3. Authenticated_Pivot
6. Low_Footprint_Alternatives
opensource
Syntaxes
Chisel
SCP to move file
SMB Download
xfreerdp
Tunneling
ligolo-ng-guide
SSH Tunneling
Web
2.1 Learn Web
2. DNS Security - Defen ding Against Attacks
3. Load Balancer Security- Defending Against Attacks
5. Databases
6. Web Caching Security- Attacks & Mitigation Strategies
7a. Introduction to Job Queue Security
8. Microservices Security- Protecting APIs & Authentication Mechanisms
8a. JWT
8b. OAuth
8c. SAML
9. Introduction to Data Pipeline Security
2.2 Attack Web
Data Wrapper
Bash Data Wrapper
Java Data Wrapper
Javascript Data Wrapper
Perl
PHP Data Wrapper
Debugger and Logger
Debugger - vscode
Debugger - .net - DNN
Debugger - Docker and NodeJS
Debugger - ERPNext Frappe
Debugger-Docker
Debugger-Maria
Debugger-VSCODE-Python
Logger - MongoDB
Logger - MS SQL Server
Logger - mysql
Logger - Oracle Database
Logger - PostgreSQL
Logger - SQLite
Logger-PHP
Javascript
Session Riding CSRF
CSRF
javascript payload session riding - CSRF
Javascript, Nodejs, Express, Webpack
NodeJS - Handlebars
NodeJS- EJS
Templating Engine
Use Dev Console
MYSQL
Collation - MySQL
Logger - MariaDB
MySQL Payload
SQLI Flow
PHP
PHP
PHP_vuln.py
Prototype
Main Prototype pollution
SSTI
SSTI Payload
web_pentesting_checklist
2.1 SQLMAP
3. Command Injection
0. Attack Web
Docker
JSON Web Tokens
WAF
WASM
Web_Fingerprint_Script
Web_URL_Fingerprinting
3_Operating Systems
6. Windows OS
6.1 Learn Windows
1. Windows Basic
Windows Authentication System
LSASS - Local and Domain
Security Account Manager - Local
Windows Credentials Manager - Local
3. Flow of System Calls - ntdll.dll, kernel32.dll
4. Win32 API and Windows Native API
4a. NTDLL.DLL - Overview and Functionality
5b. From Memory - PEB_TEB
6. Execution
7. Platform Invoke .net specific
SC
USB - How does it work?
Windows Authentication Systems ( Pending)
Windows Management Instrumentation (WMI)
Windows Remote Management
Windows User Rights
WMIC
1a. Windows Defense Mechanism
1. EDR Intro
1. Let's understand EDR like a blue team
2. Let's understand EDR like a red team
2. EDR Evasion
0. Binary creation and insertion
00. Resources
1. Download Prevention & Bypass Techniques
1a. AES, RC4, XOR encryption
1b. XOR-Based Self-Decrypting Payload (With Memory Execution)
1c. RC4-Based Self-Decrypting Payload (C++)
1d. AES-Based Self-Decrypting Payload (C++)
1e. Advanced UPX Methods for Modifying Binary Structure
2. Direct syscalls intro
2a. Direct Syscalls cpp
2b. Indirect Syscalls intro
2c. Indirect Syscalls -Tool
3. API Hooking
0. Windows defense mechanism
Bypass EDR!!
2. Online article deep dive
CVE-2016-6563
CVE-2024-9473
Part 1 - Bypassing Windows Defender Application Control with Loki C2
6.2. Active Directory
6.2.1. Attack Active Directory
1. External Initial Access
2a. Credential Harvesting
2b. Gaining Access Without Credentials
3. Entering a Domain-Joined Machine
4. Enumerating a Domain-Joined Machine
5a. Privilege Escalation
5b. Establishing Persistence
6. Enumerating Forest and Trust Relationships
10. LDAP
4_Threat Modeling
Mobility
open5gs_lab
15_real_world_attack_matrix
16_android_cell_analysis
17_test_plan_4g_5g_holistic
999. Stuff
Automation
Automate OSWE starting routine
Learn Programming
Learn C_C++
0. Cross Compiling - From Linux to Windows binary
Learn Python
Threading
uv
Venv
Learn Rust
Rust Cross-Compilation Guide (Linux to Windows)
Publish Stuff
Digital Garden and github issue
Digital Garden Resources
Publish free
Use Gemini with Obsidian
Tunneling
SSH Tunneling
9999. Projects with Kids
Make Water
Start a Fire
Select a result to preview
2c. Indirect Syscalls -Tool
https://github.com/klezVirus/SysWhispers3