Skip to content

CyberSecurityUP/Red-Team-Exercises

Folders and files

NameName
Last commit message
Last commit date

Latest commit

e89aba7 · Mar 19, 2025

History

69 Commits
Mar 4, 2025
Mar 1, 2025
Mar 15, 2025
Mar 19, 2025
Sep 20, 2024
Jan 23, 2025
Oct 26, 2024
Aug 17, 2024
Nov 12, 2024
Jul 4, 2024
Jul 4, 2024
Jan 10, 2025
Apr 19, 2024
Sep 3, 2024

Repository files navigation

Red-Team-Exercises

Repository of my LinkedIn posts about Red Team Exercises

My LinkedIn: https://www.linkedin.com/in/joas-antonio-dos-santos/

Download Lab Dev: https://mega.nz/file/LB1HTQQL#UQ9dKCj55NO1up-iJxfUqGXpV7uJlSMuONhdr6Z8NBo

LinkedIn posts

Red Team Exercises #0 - Red Team Dev Machine Download https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamdev-redteamexercises-activity-7264053830919614465--0xL?utm_source=share&utm_medium=member_desktop

Red Team Exercise #1 - How to improve my shellcode runner https://www.linkedin.com/posts/joas-antonio-dos-santos_hacking-redteam-cybersecurity-activity-7187108451313983489-X0uc?utm_source=share&utm_medium=member_desktop

Red Team Exercises #2 - What can't be missing from your nginx redirectors? https://www.linkedin.com/posts/joas-antonio-dos-santos_hacking-redteam-cybersecurity-activity-7187864603651952640-vR8f?utm_source=share&utm_medium=member_desktop

Red Team Exercises #3 - AMSI Bypass https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-cybersecurity-amsibypass-activity-7191807240637472769-XoHb?utm_source=share&utm_medium=member_desktop

Red Team Exercises #4 - Domain Controller Owned PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_hacking-redteam-cybersecurity-activity-7192621508408594432-62X1?utm_source=share&utm_medium=member_desktop

Red Team Exercises #5 - Spear-Phishing Campaign 1 https://www.linkedin.com/posts/joas-antonio-dos-santos_hacking-redteam-cybersecurity-activity-7193434385600147457-7qzf?utm_source=share&utm_medium=member_desktop

Red Team Exercises #6- ETW Evasion https://www.linkedin.com/posts/joas-antonio-dos-santos_hacking-redteam-cybersecurity-activity-7196117085263904769-sjH6?utm_source=share&utm_medium=member_desktop

Red Team Exercises #7 - PPL Bypass https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-cybersecurity-pplevasion-activity-7201681520439296001-pd-g?utm_source=share&utm_medium=member_desktop

Red Team Exercises #8 - SmartScreen Bypass https://www.linkedin.com/posts/joas-antonio-dos-santos_hacking-redteam-cybersecurity-activity-7204821933102739456-xpld?utm_source=share&utm_medium=member_desktop

Red Team Exercises #9 - Process Injection https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-cybersecurity-informationsecurity-activity-7207721019216769025-nSUL?utm_source=share&utm_medium=member_desktop

Red Team Exercises #10 - Spear-Phishing PT.2 https://www.linkedin.com/posts/joas-antonio-dos-santos_hacking-redteam-cybersecurity-activity-7208825346891124736-Jzz4?utm_source=share&utm_medium=member_desktop

Red Team Exercises #11 - Physical Operations PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-hacking-redteam-activity-7211889402178916353-yRsn?utm_source=share&utm_medium=member_desktop

Red Team Exercises #12 - AntiVM/Sandbox Evasion https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7214304403904724992-9wKd?utm_source=share&utm_medium=member_desktop

Red Team Exercises #13 - Windows API Hooking and DLL Injection https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-cybersecurity-activity-7216952225355464704-NSRp?utm_source=share&utm_medium=member_desktop

Red Team Exercises #14 - Direct and Indirect Syscall PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-cybersecurity-syscall-activity-7218437410651594752-h9K5?utm_source=share&utm_medium=member_desktop

Red Team Exercises #15 - Direct Syscall Lsass Dump https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-informationsecurity-activity-7220958774251913216-aOYp?utm_source=share&utm_medium=member_desktop

Red Team Exercises #16 - BYOVD Technique PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-byovd-activity-7222089315663642625-yPSU?utm_source=share&utm_medium=member_desktop

Red Team Exercises #17 - Active Directory Enumeration PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7225871406910103552-5bjN?utm_source=share&utm_medium=member_desktop

Red Team Exercises #18 - C2 Redirector PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-cybersecurity-activity-7227644801649676288-uYB7?utm_source=share&utm_medium=member_desktop

Red Team Exercises #19 - Alternative, Custom or Undocumented Implementations of Windows API PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteamoperations-defenseevasion-activity-7229563862759403520-h9_7?utm_source=share&utm_medium=member_desktop

Red Team Exercises #20 - EDR Evasion using Hookchain Technique Created by Hélvio Júnior, SCMPA e SCWAP Leader, OSCE3, OSCP, eCXD https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7230653751382994944-qZs9?utm_source=share&utm_medium=member_desktop

Red Team Exercises #21 - Havoc C2 Profile https://www.linkedin.com/posts/joas-antonio-dos-santos_cyberecurity-redteamexercises-redteam-activity-7236704509563985920-EpJ4?utm_source=share&utm_medium=member_desktop

Red Team Exercises #22 - MutationGate Technique EDR Evasion by Ziyi Shen https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-cybersecurity-activity-7239467211545886720-JdxV?utm_source=share&utm_medium=member_desktop

Red Team Exercises #23 - Windows API Hashing https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-cybersecurity-activity-7243227509549371392-curr?utm_source=share&utm_medium=member_desktop

Red Team Exercises #24 - Powershell Unmanaged or Powershell w/o Powershell https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-cybersecurity-activity-7245123542587981824-fwZT?utm_source=share&utm_medium=member_desktop

Red Team Exercises #25 - UnhookingPatch by Saad AHLA https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-cybersecurity-redteamexercises-activity-7246214606099009536-eVrM?utm_source=share&utm_medium=member_desktop

Red Team Exercises #26 - Syswhisper3 - (in)Direct Syscall Tool https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-syscalls-ugcPost-7247988959685873666-W0pQ?utm_source=share&utm_medium=member_desktop

Red Team Exercises #27 - Syscall Hook Detector https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7249584951036133376-dc8t?utm_source=share&utm_medium=member_desktop

Red Team Exercises #28 - Mimikatz Cheatsheet Basic https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-cybersecurity-activity-7253180441560530945-wTeF?utm_source=share&utm_medium=member_desktop

Red Team Exercises #29 - HTML Smuggling Delivery https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7255911100032995328-q-W8?utm_source=share&utm_medium=member_desktop

Red Team Exercises #30 - Creating a simple Dropper in C++ PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-cybersecurity-activity-7258880173310132224-o_NG?utm_source=share&utm_medium=member_desktop

Red Team Exercises #31 - Movfuscator (A fun way to obfuscate, but perhaps not effective these days) https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7262037200475721731-McHq?utm_source=share&utm_medium=member_desktop

Red Team Exercises #32 - Donut Shellcode Generator PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-cybersecurity-activity-7264846631399776256-nV6Q?utm_source=share&utm_medium=member_desktop

Red Team Exercises #33 - Shellcode Runner with Kill Switch / Panic Switch https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7268790211692670977-kFeT?utm_source=share&utm_medium=member_desktop

Red Team Exercises #34 - Remote Thread Hijacking https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7271003348558860288-M8tu?utm_source=share&utm_medium=member_desktop

Red Team Exercises #35 - Impacket Collection Tools for Exploitation AD https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-cybersecurity-activity-7278249542951616513-wcAo?utm_source=share&utm_medium=member_desktop

Red Team Exercises #36 - Persistence Techniques to Windows PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-persistence-activity-7279705498055028736-vE6K?utm_source=share&utm_medium=member_desktop

Red Team Exercises #37 - Initial Access with LNK File https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7281414057784467457-rbzO?utm_source=share&utm_medium=member_desktop

Red Team Exercises #38 - SliverC2 and Shellcode Runner with Rust https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7283605426347126784-kFT_?utm_source=share&utm_medium=member_desktop

Red Team Exercises #39 - Get System via Vulnerable Driver Example using Userland Program https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-cybersecurity-redteamexercises-activity-7286550523871162368-8LhG?utm_source=share&utm_medium=member_desktop

Red Team Exercises #40 - Dylib Injection in MacOS https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7288198763322511364-VT5d?utm_source=share&utm_medium=member_desktop

Red Team Exercises #41 - Create your Pipeline to Offensive Development PT.1 MAAS by Joff Thyer https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-devops-cybersecurity-activity-7291583180384473088-PHCR?utm_source=share&utm_medium=member_desktop

Red Team Exercises #42 - Build your own C2 PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-cybersecurity-activity-7293732841065005056-D7Yi?utm_source=share&utm_medium=member_desktop&rcm=ACoAACQUGCUBpvQerFv0ut2s0MSLX9IwuKJJrbU

Red Team Exercises #43 - BOF Development PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercisees-commandandcontrol-activity-7296747669199216640-IZJO?utm_source=share&utm_medium=member_desktop&rcm=ACoAACQUGCUBpvQerFv0ut2s0MSLX9IwuKJJrbU

Red Team Exercises #44 - Initial Access with VBA Macro PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_hacking-redteam-cybersecurity-activity-7297747587611201536-dc0p?utm_source=share&utm_medium=member_desktop&rcm=ACoAACQUGCUBpvQerFv0ut2s0MSLX9IwuKJJrbU

Red Team Exercises #45 - Monitoring Techniques for Your Red Team Infrastructure PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-cybersecurity-redteamexercises-activity-7299449832790777858-WcWk?utm_source=share&utm_medium=member_desktop&rcm=ACoAACQUGCUBpvQerFv0ut2s0MSLX9IwuKJJrbU

Red Team Exercises #46 - Shellcode Encryption using XOR PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-shellcoderunner-activity-7301643766367416321-qXy3?utm_source=share&utm_medium=member_desktop&rcm=ACoAACQUGCUBpvQerFv0ut2s0MSLX9IwuKJJrbU

Red Team Exercises #47 - Vulnerability Research in Drivers Example PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7302757314783027200-7pVf?utm_source=share&utm_medium=member_desktop&rcm=ACoAACQUGCUBpvQerFv0ut2s0MSLX9IwuKJJrbU

Red Team Exercises #48 - Privilege Escalation PT.1 - Token Manipulation https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7307015283930488832-Etv-?utm_source=share&utm_medium=member_desktop&rcm=ACoAACQUGCUBpvQerFv0ut2s0MSLX9IwuKJJrbU

Red Team Exercises #49 - Bypass DLP PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-cybersecurity-redteamexercises-activity-7308108480517701634-xTYQ?utm_source=share&utm_medium=member_desktop&rcm=ACoAACQUGCUBpvQerFv0ut2s0MSLX9IwuKJJrbU


OSINT-Red-Team-Exercises

OSINT for Red Team Exercises - #1 Dorks Search using sitedorks Tool https://www.linkedin.com/posts/joas-antonio-dos-santos_cybersecurity-redteamexercises-osintexercises-activity-7253736729285672961-SKDq?utm_source=share&utm_medium=member_desktop

OSINT for Red Team Exercises #2 - Credential Leaks: Exploring Targets with Compromised Data Intelligence PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_cybersecurity-osint-osintforredteam-activity-7257723022843781120-Otii?utm_source=share&utm_medium=member_desktop

OSINT for Red Team Exercises #3 - Whois and Resolving Domains https://www.linkedin.com/posts/joas-antonio-dos-santos_osintexercises-redteam-cybersecurity-activity-7265813615121727491-PKos?utm_source=share&utm_medium=member_desktop

OSINT for Red Team Exercises #4 - Deep/Dark Web Search PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_osint-redteam-cybersecurity-activity-7275701771451199488-uIxe?utm_source=share&utm_medium=member_desktop