Privacy Alternatives to Google Products

Privacy Alternatives to Google Products – It’s no surprise that google logs everything you do online while using their service,…

Command and Control Frameworks for Adversary Simulation and Red Team Operations

Command and Control Frameworks – most of the time abbreviated to C2, are necessary tools in maintaining access and making…

Who to follow on twitter

No BS tips and tricks from researchers concerning red teams, penetration tests, and adversary simulations. Topics discussed are but not…

Windows Security Artifacts

Log files & artifacts of built-in and popular apps in Windows that can aid red teams identify potentially important information…

Offensive Security Certified Professional Review Guide

Offensive Security Certified Professional (OSCP) Review Guide From Wikipedia – Offensive Security Certified Professional (OSCP) is an ethical hacking certification…

Subaru Starlink Head Unit Exploit

A vulnerability in the update mechanism of Subaru StarLink head units 2017, 2018, and 2019 may give an attacker (with…

AWS Hosting Security Recommendation

In the majority of cases, breaches and data exposure happens due to user misconfiguration of available security settings. Most hosting…

Raining Metasploit Shell With Nessus

When you’re deep into your client’s network and time is of the essence, this tool can help alleviate some of…

Red Team Field Manual [Free PDF Download]

The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who…

Firefox Privacy about:config Tweaks

This is a collection of privacy-related about:config tweaks to enhance the privacy of your Firefox browser. Preparation: Enter “about:config” in…