Articles by Tag #redteam

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

KAPLAN — Stealthy Bulk Fetching Over Tor for Red Team Ops

A multithreaded, identity-rotating, resilient file fetcher built for covert red team reconnaissance...

Learn More 21 0Nov 5 '25

Decoy-Hunter: Bypassing "All Ports Open" Deception in Offensive Security

The defensive idea belongs to https://t.me/s0i37_channel 🛡️→⚔️ Decoy-Hunter: Bypassing "All...

Learn More 47 21Sep 26 '25

THC Scalpel - Stealth Reconnaissance Toolkit for Red Team Operations

A Tribute to The Hacker's Choice Legacy We want to express our deepest gratitude to The...

Learn More 16 0Dec 6 '25

The Assessor's Gambit: A Deep Dive into White, Gray, and Black Box Penetration Testing

Beyond the Digital Fortress In the strategic landscape of cybersecurity, every...

Learn More 3 0Oct 26 '25

Why You Should Build Your Own C2

Originally published at Cyberpath Command and control (C2) servers are central to offensive...

Learn More 0 0Jan 2

Python For Exploit Development

Attacking Memory Corruption with Python - a practical guide to building buffer overflow exploits

Learn More 0 0Nov 16 '25

PIC shellcode: The Rust Way

Originally published at Cyberpath A Hands-On Analysis of the Rustic64 Project In...

Learn More 0 0Jan 2

Silent Signals: Hiding Red Team Operations in AI Noise by Arvind Sundararajan

Silent Signals: Hiding Red Team Operations in AI Noise Imagine your network's awash in AI...

Learn More 0 1Nov 23 '25

""Rediska" - a bad man" - Redis in Kubernetes Ecosystems: From Configuration Leaks to Lateral Movement in Red Team.

A comprehensive Red Team guide to Redis exploitation with AI-assisted result analysis 🎯...

Learn More 24 4Sep 11 '25

Understanding Red Team Operations: A Technical Deep Dive

Originally published at Cyberpath What is Red Teaming? Red teaming goes beyond...

Learn More 0 0Jan 2

HackTeam.RED: From API Keys to Full Infrastructure Compromise

🚀 HackTeam.RED: From API Keys to Full Infrastructure Compromise Professional Penetration...

Learn More 21 12Aug 26 '25

Red Team vs. Blue Team: Strategies for Advanced Penetration Testing

Originally published at Cyberpath As cybersecurity threats evolve in complexity and scale, the...

Learn More 0 0Jan 2

Beyond the Firewall: Why Every Developer Needs an Adversarial Mindset

The Adversarial Developer: Building Security Through Attacker Thinking Security isn't...

Learn More 1 0Sep 20 '25

Exploring the GenAI Red Teaming Guide

Generative AI systems, such as Large Language Models (LLMs), are not only revolutionizing industries,...

Learn More 9 1Feb 2 '25

2026 Red Team - Kendi Hacking Araçlarımızı Yazmayı Öğreniyoruz

Arkadaşlar selamlar, bu hesapta artık sizlerle birlikte Türkçe bilen arkadaşlar için kendi red team...

Learn More 0 0Dec 7 '25

Passing the PNPT: A Practical Perspective on Modern Pentesting

Today I officially passed the PNPT (Practical Network Penetration Tester) certification by TCM...

Learn More 0 0Jan 13

zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework

zer0DAYSlater is a modular, offline-capable red-team research framework built to simulate advanced...

Learn More 0 0Nov 9 '25

The intel Management Engine:~The Ghost in your machine

Most Intel systems include a hidden microcontroller known as the Intel Management Engine (IME),...

Learn More 2 0Aug 12 '25

Password Cracking Project #1 – From Privilege Escalation to Hashcat

🔹 Objective: Learn and apply the end-to-end process of password cracking on Metasploitable2. 🔹 Steps...

Learn More 5 0Sep 6 '25

Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

Chicago's Irish American Heritage Center stands as a testament to the enduring spirit of community...

Learn More 1 0Jun 13 '25

SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

In Part 1, I described the philosophy behind building SHENRON: the need for persistence tooling that...

Learn More 1 0Jul 22 '25

SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

Down the Rabbit Hole: The Anatomy of Evasion Blue teams buy new EDR every year. Off the shelf...

Learn More 1 0Jul 23 '25

From Recon to Exfiltration: A Step-by-Step Red Team Exercise in Azure and AWS

This will cover: Preparation & Scope Step-by-Step Attack Simulation (per cloud) Tools &...

Learn More 1 0Aug 11 '25

SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

If you’ve ever deployed persistence in an active environment, you know the difference between theory...

Learn More 1 0Jul 20 '25

🧨 Stop manually pentesting. I built an AI that thinks like a red team — and it’s nearly ready.

🔥 Hey folks, I've been quietly working on something that could genuinely shift the game for: 🧑‍💻...

Learn More 1 0Jul 1 '25

Hack Smarter, Not Harder: Engineering a Self Documenting Shell Framework

Why Aliases Matter: Beyond Shortcuts If you treat aliases like mere shortcuts, you’re missing out...

Learn More 1 0Jul 27 '25

Stop Googling Reverse Shells: Meet oh-my-shells

Tired of having 10,000 gists? Of having 30 revshells.com tabs? Of Googling the payloads you need??? Meet oh-my-shells, a structured, searchable, and extendable payload/listener framework.

Learn More 0 0Aug 31 '25

New Step Is Here..!

My Cybersecurity Learning Journey Starts Here Hi, I'm Seif Eldein Ahmad Mohammad, a student at...

Learn More 0 0Apr 24 '25

What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

In the ever-evolving field of cybersecurity, the use of Artificial Intelligence (AI) has changed the...

Learn More 0 0Apr 13 '25

From Code to Capital: The Hacker Mindset Revolutionizing Algorithmic Trading

Imagine a world where the elusive figure, once known only for breaching digital fortresses in dimly...

Learn More 1 0Feb 21 '25