DEV Community

# redteam

Adversary emulation, advanced persistent threat simulation, and red team operations.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
My Next Step in Cybersecurity: Internship at Young Cyber Knights Foundation

My Next Step in Cybersecurity: Internship at Young Cyber Knights Foundation

1
Comments
1 min read
Stop Googling Reverse Shells: Meet oh-my-shells

Stop Googling Reverse Shells: Meet oh-my-shells

Comments
5 min read
Decoy-Hunter: Bypassing "All Ports Open" Deception in Offensive Security

Decoy-Hunter: Bypassing "All Ports Open" Deception in Offensive Security

47
Comments 21
4 min read
Beyond the Firewall: Why Every Developer Needs an Adversarial Mindset

Beyond the Firewall: Why Every Developer Needs an Adversarial Mindset

1
Comments
4 min read
""Rediska" - a bad man" - Redis in Kubernetes Ecosystems: From Configuration Leaks to Lateral Movement in Red Team.

""Rediska" - a bad man" - Redis in Kubernetes Ecosystems: From Configuration Leaks to Lateral Movement in Red Team.

24
Comments 4
22 min read
HackTeam.RED: From API Keys to Full Infrastructure Compromise

HackTeam.RED: From API Keys to Full Infrastructure Compromise

21
Comments 12
4 min read
The intel Management Engine:~The Ghost in your machine

The intel Management Engine:~The Ghost in your machine

2
Comments
3 min read
From Recon to Exfiltration: A Step-by-Step Red Team Exercise in Azure and AWS

From Recon to Exfiltration: A Step-by-Step Red Team Exercise in Azure and AWS

1
Comments
3 min read
🧨 Stop manually pentesting. I built an AI that thinks like a red team — and it’s nearly ready.

🧨 Stop manually pentesting. I built an AI that thinks like a red team — and it’s nearly ready.

1
Comments
1 min read
Hack Smarter, Not Harder: Engineering a Self Documenting Shell Framework

Hack Smarter, Not Harder: Engineering a Self Documenting Shell Framework

1
Comments
5 min read
SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

1
Comments
2 min read
SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

1
Comments
4 min read
SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

1
Comments
3 min read
Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

1
Comments
6 min read
What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.