DEV Community

# redteam

Adversary emulation, advanced persistent threat simulation, and red team operations.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

1
Comments
4 min read
SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

1
Comments
3 min read
From PEB to WinExec: Manual Shellcode Execution Without Imports on Windows x64

From PEB to WinExec: Manual Shellcode Execution Without Imports on Windows x64

2
Comments
12 min read
Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

1
Comments
6 min read
What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

Comments
6 min read
Think you can outsmart a WAF? Try SafeLine!

Think you can outsmart a WAF? Try SafeLine!

6
Comments
1 min read
New Step Is Here..!

New Step Is Here..!

Comments
1 min read
From Code to Capital: The Hacker Mindset Revolutionizing Algorithmic Trading

From Code to Capital: The Hacker Mindset Revolutionizing Algorithmic Trading

1
Comments
3 min read
Exploring the GenAI Red Teaming Guide

Exploring the GenAI Red Teaming Guide

9
Comments 1
2 min read
Linux Privilege Escalation: Techniques and Examples

Linux Privilege Escalation: Techniques and Examples

1
Comments
5 min read
How to Explore an Exposed .git

How to Explore an Exposed .git

7
Comments 1
4 min read
Understanding the MITRE ATT&CK Platform: A Valuable Resource for Cybersecurity Professionals

Understanding the MITRE ATT&CK Platform: A Valuable Resource for Cybersecurity Professionals

Comments
2 min read
Sliver and Cursed Chrome for Post Exploitation

Sliver and Cursed Chrome for Post Exploitation

6
Comments
5 min read
Docker image recon

Docker image recon

Comments
3 min read
Kernel module HTTP request sniffing

Kernel module HTTP request sniffing

5
Comments
2 min read
Process hiding in Linux

Process hiding in Linux

1
Comments
1 min read
PrivEsc with LD_PRELOAD

PrivEsc with LD_PRELOAD

2
Comments
1 min read
Exploiting unverified JWT signatures

Exploiting unverified JWT signatures

7
Comments
2 min read
loading...