BIG SHOUT OUT TO ZORS /./ ONE LUV
Computer button pusher // Autodidact since my childhood || SIN - SIN HACK - HACK || NO-CODE evangelist || Skiddie learning REDTEAMING - Black coffee like my sense of humor Saltinbank-SyS

This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
👉𝗪𝗛𝗔𝗧 𝗜𝗦 𝗥𝗘𝗗 𝗧𝗘𝗔𝗠? | |
🌟Red Team definition, redteam guide by Joe Vest & James Tubberville | |
https://lnkd.in/eUaZcWvg | |
🌟Red Teaming Handbook, UK Ministry of Defense | |
https://lnkd.in/euUkwQRq | |
👉𝗪𝗛𝗔𝗧 𝗔𝗥𝗘 𝗥𝗘𝗗 𝗧𝗘𝗔𝗠 𝗘𝗫𝗘𝗥𝗖𝗜𝗦𝗘𝗦? | |
🌟NIST’s Definition of Red Team Exercise |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
https://drive.google.com/file/d/1BF1L3KpbloRzNSPAC4RTuD1tzbZCG6zs/view?usp=sharing, |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
🔰 Simple Home-Lab (Firewall) with some of the use cases to Practice SOC . | |
👉 Download Virtualbox: https://lnkd.in/g8Cfjys9 | |
👉 Download Kali Linux: https://lnkd.in/gQWU9zcD | |
👉 Download PfSense Firewall: https://lnkd.in/gC7V2KrX | |
👉 PfSense Installation: https://lnkd.in/gGU5tHed | |
👉 Download Windows 10 | |
🔰 Create Two network interfaces on pfSense Firewall, one connected to the Windows 10 network, and the other to the Kali Linux network. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
𝐋𝐢𝐬𝐭 𝐨𝐟 𝟓𝟎 𝐓𝐨𝐩 𝐃𝐢𝐠𝐢𝐭𝐚𝐥 𝐅𝐨𝐫𝐞𝐧𝐬𝐢𝐜𝐬 𝐓𝐎𝐎𝐋𝐒 . | |
1. Autopsy: https://www.autopsy.com/ | |
2. EnCase: https://lnkd.in/dRwh9VwZ | |
3. AccessData Forensic Toolkit (FTK): https://lnkd.in/dwhkAFKt | |
4. X-Ways Forensics: https://www.x-ways.net/ | |
5. Sleuth Kit: https://www.sleuthkit.org/ | |
6. Volatility: https://lnkd.in/dXX7-Vwc | |
7. Wireshark: https://www.wireshark.org/ | |
8. Cellebrite UFED: https://lnkd.in/dqm7x8cs |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1. 🎓Certified in Cybersecurity℠ - CC by ICS2: https://lnkd.in/gW3w8Jqu | |
2. 🎓Cybersecurity Essentials by Cisco Academy: https://lnkd.in/gZe6bf-t | |
3. 🎓Networking Essentials by Cisco Academy: https://lnkd.in/gjipDpgG | |
4. 🎓Intro to Information Security by Udacity: https://lnkd.in/ggdYxnUp | |
5. 🎓Network Security by Udacity: https://lnkd.in/gSHx2tJQ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@echo off | |
FOR /F "tokens=1,2*" %%V IN ('bcdedit') DO SET adminTest=%%V | |
IF (%adminTest%)==(Access) goto noAdmin | |
for /F "tokens=*" %%G in ('wevtutil.exe el') DO (call :do_clear "%%G") | |
echo. | |
echo Event Logs are now in Heaven .. // Event Logs sont au Paradis! <Press any Key ^^ // Pressez une Touche ^^> | |
goto theEnd | |
:do_clear | |
echo effacement %1 | |
wevtutil.exe cl %1 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
🎡 Attack-Defense - https://buff.ly/3FMbOB6 | |
🎡 Alert to win - https://buff.ly/3BtqJOb | |
🎡 Bancocn - https://buff.ly/3HpEWzo | |
✨ CTF Komodo Security - https://buff.ly/3FLdtXs | |
✨ CryptoHack - https://buff.ly/2XkGXpC | |
✨ CMD Challenge -https://buff.ly/3oJR9E7 | |
❄ Exploitation Education - https://buff.ly/3llfSNt | |
❄ Google CTF - https://buff.ly/3hht1c8 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
How-tos (text based) | |
The Havoc C2 Framework - https://lnkd.in/gUnkxpRg | |
Havoc C2 Basics - https://lnkd.in/gps2mKaH | |
Havoc C2 Intro & Inline C# Compilation within PowerShell - https://lnkd.in/gf4rTRck | |
Home Grown Red Team: Getting System On Windows 11 With Havoc C2 - https://lnkd.in/gpwJi4fi | |
Home Grown Red Team: From Workstation To Domain Controller With Havoc C2 and Microsoft EDR - https://lnkd.in/gvBY2KqY | |
How-to (video) | |
IRL Hacker: EP #37 - Havoc C2 With #C5pider - https://lnkd.in/gvG_NEAJ |