DEV Community

# redteam

Adversary emulation, advanced persistent threat simulation, and red team operations.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Stop Googling Reverse Shells: Meet oh-my-shells

Stop Googling Reverse Shells: Meet oh-my-shells

Comments
5 min read
Decoy-Hunter: Bypassing "All Ports Open" Deception in Offensive Security

Decoy-Hunter: Bypassing "All Ports Open" Deception in Offensive Security

47
Comments 21
4 min read
Beyond the Firewall: Why Every Developer Needs an Adversarial Mindset

Beyond the Firewall: Why Every Developer Needs an Adversarial Mindset

1
Comments
4 min read
""Rediska" - a bad man" - Redis in Kubernetes Ecosystems: From Configuration Leaks to Lateral Movement in Red Team.

""Rediska" - a bad man" - Redis in Kubernetes Ecosystems: From Configuration Leaks to Lateral Movement in Red Team.

24
Comments 4
22 min read
HackTeam.RED: From API Keys to Full Infrastructure Compromise

HackTeam.RED: From API Keys to Full Infrastructure Compromise

21
Comments 12
4 min read
The intel Management Engine:~The Ghost in your machine

The intel Management Engine:~The Ghost in your machine

2
Comments
3 min read
From Recon to Exfiltration: A Step-by-Step Red Team Exercise in Azure and AWS

From Recon to Exfiltration: A Step-by-Step Red Team Exercise in Azure and AWS

1
Comments
3 min read
🧨 Stop manually pentesting. I built an AI that thinks like a red team — and it’s nearly ready.

🧨 Stop manually pentesting. I built an AI that thinks like a red team — and it’s nearly ready.

1
Comments
1 min read
Hack Smarter, Not Harder: Engineering a Self Documenting Shell Framework

Hack Smarter, Not Harder: Engineering a Self Documenting Shell Framework

1
Comments
5 min read
SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

1
Comments
2 min read
SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

1
Comments
4 min read
SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

1
Comments
3 min read
Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

1
Comments
6 min read
What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

Comments
6 min read
Think you can outsmart a WAF? Try SafeLine!

Think you can outsmart a WAF? Try SafeLine!

6
Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.