Articles by Tag #redteam

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Exploring the GenAI Red Teaming Guide

Generative AI systems, such as Large Language Models (LLMs), are not only revolutionizing industries,...

Learn More 9 1Feb 2

HackTeam.RED: From API Keys to Full Infrastructure Compromise

🚀 HackTeam.RED: From API Keys to Full Infrastructure Compromise Professional Penetration...

Learn More 7 4Aug 26

Think you can outsmart a WAF? Try SafeLine!

I’d like to introduce SafeLine WAF — a free, open-source, self-hosted alternative to Cloudflare...

Learn More 6 0Apr 25

From PEB to WinExec: Manual Shellcode Execution Without Imports on Windows x64

Table of Contents What's this about? Who's this for? Must Know Concepts (Before You Dive...

Learn More 2 0Jul 18

The intel Management Engine:~The Ghost in your machine

Most Intel systems include a hidden microcontroller known as the Intel Management Engine (IME),...

Learn More 2 0Aug 12

Red Team Testing: The Ultimate Cybersecurity Stress Test Your Organization Needs

Real attackers don’t follow scripts. So why should your security assessments? TL;DR Red Team Testing...

Learn More 1 0Jul 14

Hack Smarter, Not Harder: Engineering a Self Documenting Shell Framework

Why Aliases Matter: Beyond Shortcuts If you treat aliases like mere shortcuts, you’re missing out...

Learn More 1 0Jul 27

SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

Down the Rabbit Hole: The Anatomy of Evasion Blue teams buy new EDR every year. Off the shelf...

Learn More 1 0Jul 23

Linux Privilege Escalation: Techniques and Examples

Privilege escalation is a critical phase in penetration testing and ethical hacking, where an...

Learn More 1 0Oct 16 '24

SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

In Part 1, I described the philosophy behind building SHENRON: the need for persistence tooling that...

Learn More 1 0Jul 22

🧨 Stop manually pentesting. I built an AI that thinks like a red team — and it’s nearly ready.

🔥 Hey folks, I've been quietly working on something that could genuinely shift the game for: 🧑‍💻...

Learn More 1 0Jul 1

SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

If you’ve ever deployed persistence in an active environment, you know the difference between theory...

Learn More 1 0Jul 20

Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

Chicago's Irish American Heritage Center stands as a testament to the enduring spirit of community...

Learn More 1 0Jun 13

RED TEAM DALAM KEAMANAN SIBER

Red Team dalam Keamanan Siber Dalam dunia keamanan siber, Red Team adalah tim yang...

Learn More 0 0Feb 16

From Recon to Exfiltration: A Step-by-Step Red Team Exercise in Azure and AWS

This will cover: Preparation & Scope Step-by-Step Attack Simulation (per cloud) Tools &...

Learn More 0 0Aug 11

The Role of Termux in Red Team vs Blue Team Exercises

Red vs Blue team exercises are essential in cybersecurity training. They simulate real-world attacks...

Learn More 0 0Aug 5

SubSurfer

SubSurfer SubSurfer is an open-source security tool designed for efficiently identifying...

Learn More 0 0Jan 27

New Step Is Here..!

My Cybersecurity Learning Journey Starts Here Hi, I'm Seif Eldein Ahmad Mohammad, a student at...

Learn More 0 0Apr 24

How to Conduct a Successful Red Team Exercise: A Step-by-Step Guide

In today’s high-stakes cybersecurity environment, businesses need more than firewalls and antivirus...

Learn More 0 0Jun 6

Tried and Tested Many Courses, But Still No Results? Hackersprey’s ACWP is Your Answer.

Have you spent countless hours on various cybersecurity courses and certifications but still feel...

Learn More 0 0Jan 23

From Code to Capital: The Hacker Mindset Revolutionizing Algorithmic Trading

Imagine a world where the elusive figure, once known only for breaching digital fortresses in dimly...

Learn More 0 0Feb 21

What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

In the ever-evolving field of cybersecurity, the use of Artificial Intelligence (AI) has changed the...

Learn More 0 0Apr 13

why corporates and defense sectors are choosing Hackersprey’s ACWP for cybersecurity training.

Discover how our comprehensive and industry-leading courses are empowering organizations to enhance...

Learn More 0 0Feb 18