Red team training https://mr.un1k0d3r.world/training/
Github https://github.com/Mr-Un1k0d3r
www.linkedin.com/posts/charle...
#RedTeaming #EDR
www.linkedin.com/posts/charle...
#RedTeaming #EDR
Tonight, we continue building a reconnaissance tool for Azure to identify Azure attack vectors. This is Part III and the final part of our Azure journey.
truecyber.world
#Azure #redteaming
Tonight, we continue building a reconnaissance tool for Azure to identify Azure attack vectors. This is Part III and the final part of our Azure journey.
truecyber.world
#Azure #redteaming
www.linkedin.com/posts/charle...
#podcast #CyberSecurity
www.linkedin.com/posts/charle...
#podcast #CyberSecurity
#Azure
#RedTeam
www.linkedin.com/posts/charle...
#Azure
#RedTeam
www.linkedin.com/posts/charle...
#Azure #RedTeam
www.linkedin.com/posts/charle...
#Azure #RedTeam
www.linkedin.com/posts/charle...
Interested in applying, feel free to reach out to me.
100% remote role; more information here:
www.linkedin.com/posts/charle...
#redteam #hiring #pentest
Interested in applying, feel free to reach out to me.
100% remote role; more information here:
www.linkedin.com/posts/charle...
#redteam #hiring #pentest
Tonight's session is about Microsoft Azure. We will do a deep dive into how it can be abused as part of a red team. We will automate the process by writing a complete tool to perform attacks and reconnaissance.
truecyber.world
Tonight's session is about Microsoft Azure. We will do a deep dive into how it can be abused as part of a red team. We will automate the process by writing a complete tool to perform attacks and reconnaissance.
truecyber.world
www.linkedin.com/posts/charle...
#Azure #RedTeam #Graph
www.linkedin.com/posts/charle...
#Azure #RedTeam #Graph
I have documented another example to have read permission on all the applications exposed in the tenant and more. Blocking default applications is crucial to prevent such vectors.
www.linkedin.com/posts/charle...
#Azure #RedTeam
I have documented another example to have read permission on all the applications exposed in the tenant and more. Blocking default applications is crucial to prevent such vectors.
www.linkedin.com/posts/charle...
#Azure #RedTeam
UsersPermissionToReadOtherUsersEnabled bypass
MFA bypass
Privileges escalation
And more
www.linkedin.com/posts/charle...
#Azure #RedTeam
UsersPermissionToReadOtherUsersEnabled bypass
MFA bypass
Privileges escalation
And more
www.linkedin.com/posts/charle...
#Azure #RedTeam
Tonight's session is about running your own LLM locally and building a simple cross-platform .NET client interface to interact with it. The private LLM is quite useful during red team exercises.
truecyber.world
Tonight's session is about running your own LLM locally and building a simple cross-platform .NET client interface to interact with it. The private LLM is quite useful during red team exercises.
truecyber.world
github.com/Mr-Un1k0d3r/...
github.com/Mr-Un1k0d3r/...
Get 50% OFF when you purchase both the Coding Class and the Red Team Training for just $400 (regularly $800). This includes over 200 hours of videos and source code.
More details here mr.un1k0d3r.world/training/a6e...
#redteam #discount
Get 50% OFF when you purchase both the Coding Class and the Red Team Training for just $400 (regularly $800). This includes over 200 hours of videos and source code.
More details here mr.un1k0d3r.world/training/a6e...
#redteam #discount
Tonight's session is about understanding the underlying concepts of Active Directory Certificate Service (ADCS) and how certificate templates can be audited using C#.
truecyber.world
Tonight's session is about understanding the underlying concepts of Active Directory Certificate Service (ADCS) and how certificate templates can be audited using C#.
truecyber.world
www.linkedin.com/posts/charle...
#redteam #webinar
www.linkedin.com/posts/charle...
#redteam #webinar
Tonight's session is about auditing and searching for misconfigured GPOs using C# during a red team exercise.
truecyber.world
Tonight's session is about auditing and searching for misconfigured GPOs using C# during a red team exercise.
truecyber.world
Tonight's episode is about writing your own SOCKS5 proxy that can serve as your complete C2, allowing you to perform all operations remotely.
truecyber.world
Tonight's episode is about writing your own SOCKS5 proxy that can serve as your complete C2, allowing you to perform all operations remotely.
truecyber.world
Tonight's session is about incorporating sandbox evasion techniques into your malware using C and C#.
truecyber.world
Tonight's session is about incorporating sandbox evasion techniques into your malware using C and C#.
truecyber.world
We will be chaining a novel technique in .NET that does not require any RWX memory allocation or external APIs.
truecyber.world
We will be chaining a novel technique in .NET that does not require any RWX memory allocation or external APIs.
truecyber.world
Tonight's session is about Understanding Azure and Graph: Automating user enumeration and more.
We'll explore how to leverage Azure and Graph during a red teaming exercise.
truecyber.world
Tonight's session is about Understanding Azure and Graph: Automating user enumeration and more.
We'll explore how to leverage Azure and Graph during a red teaming exercise.
truecyber.world
mr.un1k0d3r.online/training/lon...
Offer will last for 24 hours.
mr.un1k0d3r.online/training/lon...
Offer will last for 24 hours.
Tonight's session is about gathering user information without using LDAP queries in an Active Directory domain, using WMI.
This is achieved by using a COM object and C.
truecyber.world
Tonight's session is about gathering user information without using LDAP queries in an Active Directory domain, using WMI.
This is achieved by using a COM object and C.
truecyber.world
#redteam #cypfer
www.linkedin.com/posts/charle...
#redteam #cypfer
www.linkedin.com/posts/charle...
Let me know if you're coming too so we can catch up!
www.linkedin.com/posts/charle...
Let me know if you're coming too so we can catch up!
www.linkedin.com/posts/charle...
Tonight's session will cover a method to gather Active Directory user information remotely in a Windows domain without using LDAP queries. Instead, we will use Lsa* APIs and a bit of magic.
truecyber.world
Tonight's session will cover a method to gather Active Directory user information remotely in a Windows domain without using LDAP queries. Instead, we will use Lsa* APIs and a bit of magic.
truecyber.world