π2
Forwarded from Cyber Detective
OSWE, OSEP, OSED and OSEE Offec's certifications complete study guides (Study Materials + Labs + Reviews):.
https://github.com/CyberSecurityUP/OSCE3-Complete-Guide
https://github.com/CyberSecurityUP/OSCE3-Complete-Guide
π3
Forwarded from Red Team Village
Forwarded from Red Team Village
Maltrak | Course: In-Depth Red Teaming: APT Adversary Simulation
Info : https://access.maltrak.com/courses/in-depth-red-teaming-apt-adversary-simulation
@RedTeamVillageRTV
Info : https://access.maltrak.com/courses/in-depth-red-teaming-apt-adversary-simulation
@RedTeamVillageRTV
π₯1
Red Team Village
Maltrak | Course: In-Depth Red Teaming: APT Adversary Simulation Info : https://access.maltrak.com/courses/in-depth-red-teaming-apt-adversary-simulation @RedTeamVillageRTV
MODULE 00: Welcome & Introduction
MODULE 01: APT Attacks & Red Team Infrastructure on AWS
MODULE 02: Phishing & Social Engineering Mastery
MODULE 03: Initial Access: Get Your Foot into the Organization Network
MODULE 04: Write Your Own HTTP Malware
MODULE 05: Implement a Plugin Framework in Your Malware with Keylogger Plugin
MODULE 06: Maintaining Persistence In-Depth (Advanced Techniques)
MODULE 07: Rooting: Privilege Escalation Techniques
MODULE 08: Malware Obfuscation: Bypass File Signature Scanning
MODULE 09: Network Obfuscation: Bypass IDS, IPS, NDR, and Machine Learning-Based Tools
MODULE 10: Bypass EDRs & Behavioral-Based Detection
MODULE 11: Impersonating Users: Credential Theft & Token Impersonation
MODULE 12: Hack the Domain Controller Through Lateral Movements
MODULE 01: APT Attacks & Red Team Infrastructure on AWS
MODULE 02: Phishing & Social Engineering Mastery
MODULE 03: Initial Access: Get Your Foot into the Organization Network
MODULE 04: Write Your Own HTTP Malware
MODULE 05: Implement a Plugin Framework in Your Malware with Keylogger Plugin
MODULE 06: Maintaining Persistence In-Depth (Advanced Techniques)
MODULE 07: Rooting: Privilege Escalation Techniques
MODULE 08: Malware Obfuscation: Bypass File Signature Scanning
MODULE 09: Network Obfuscation: Bypass IDS, IPS, NDR, and Machine Learning-Based Tools
MODULE 10: Bypass EDRs & Behavioral-Based Detection
MODULE 11: Impersonating Users: Credential Theft & Token Impersonation
MODULE 12: Hack the Domain Controller Through Lateral Movements
π2
β‘ CS 390R: Reverse Engineering and Vulnerability Analysis Free Course
https://pwn.umasscybersec.org/lectures/index.html#
https://pwn.umasscybersec.org/lectures/index.html#
π1
Hiding Linux Processes with Bind Mounts
https://dfir.ch/posts/slash-proc/
https://righteousit.com/2024/07/24/hiding-linux-processes-with-bind-mounts/
https://dfir.ch/posts/slash-proc/
https://righteousit.com/2024/07/24/hiding-linux-processes-with-bind-mounts/
