Hack more with these resources.
- https://posts.specterops.io/introducing-mystikal-4fbd2f7ae520
- https://www.sentinelone.com/blog/7-ways-threat-actors-deliver-macos-malware-in-the-enterprise/
- https://moonlock.com/macos-stealer-apple-bash-payload
- https://www.bitdefender.com/blog/labs/new-macos-backdoor-written-in-rust-shows-possible-link-with-windows-ransomware-group/
- https://www.malwarebytes.com/blog/threat-intelligence/2023/09/atomic-macos-stealer-delivered-via-malvertising
- https://securelist.com/bluenoroff-new-macos-malware/111290/
- https://www.proofpoint.com/us/blog/threat-insight/welcome-new-york-exploring-ta453s-foray-lnks-and-mac-malware
- https://objectivebythesea.org/v6/talks/OBTS_v6_gLongo_bWiley.pdf
- https://www.trendmicro.com/en_us/research/20/h/xcsset-mac-malware--infects-xcode-projects--uses-0-days.html
- https://sourcecodered.com/gitloker-attack/
- https://securitylabs.datadoghq.com/articles/malicious-pypi-package-targeting-highly-specific-macos-machines/
- Breaking the Chain: An Attacker's Perspective on Supply Chain Vulnerabilities and Flaws
- https://osec.io/blog/2024-06-10-supply-chain-attacks-a-new-era
- https://www.covertswarm.com/post/red-teaming-for-supply-chain-attack-defense
- https://www.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf
- From Code to Cloud: Breaking Down Advanced Software Supply Chain Red Teaming Techniques
- https://github.com/cncf/tag-security/blob/main/supply-chain-security/compromises/README.md
- https://github.blog/2024-02-21-how-to-stay-safe-from-repo-jacking/
- https://github.com/bureado/awesome-software-supply-chain-security
- https://xorl.wordpress.com/2022/04/07/ideas-for-software-supply-chain-attacks-simulation-by-red-teams/
- https://www.tenable.com/blog/the-mgm-breach-and-the-role-of-idp-in-modern-cyber-attacks
- Identity Providers for Red Teamers - Adam Chester
- https://trustedsec.com/blog/okta-for-red-teamers
- https://medium.com/nickvangilder/okta-for-red-teamers-perimeter-edition-c60cb8d53f23
- https://cloud.hacktricks.xyz/pentesting-ci-cd/okta-security
- https://www.rezonate.io/blog/bypassing-oktas-passwordless-mfa-technical-analysis-and-detection
- How To: Evilginx + BITB | Browser In The Browser without iframes in 2024
- https://github.com/waelmas/frameless-bitb
- DEF CON 31 - Defeating VPN Always On - Maxime Clementz
- VPN vs SDP – A Live Hack
- https://thereadable.co/zero-trust-framework-is-still-vulnerable-with-existing-vpn-security-researchers-disclose/
- Red Team Village c0c0n 2020 - Dan Levy - Zero trust networks: Opportunities and challenges red team
- https://media.defense.gov/2024/May/22/2003470825/-1/-1/0/CSI-APPLICATION-AND-WORKLOAD-PILLAR.PDF
- https://media.defense.gov/2024/Jul/10/2003500250/-1/-1/0/CSI-ZT-AUTOMATION-ORCHESTRATION-PILLAR.PDF
- https://media.defense.gov/2024/May/30/2003475230/-1/-1/0/CSI-VISIBILITY-AND-ANALYTICS-PILLAR.PDF
- https://media.defense.gov/2024/Apr/09/2003434442/-1/-1/0/CSI_DATA_PILLAR_ZT.PDF
- https://media.defense.gov/2024/Mar/05/2003405462/-1/-1/0/CSI-ZERO-TRUST-NETWORK-ENVIRONMENT-PILLAR.PDF
- https://media.defense.gov/2023/Oct/19/2003323562/-1/-1/0/CSI-DEVICE-PILLAR-ZERO-TRUST.PDF
- https://media.defense.gov/2023/Mar/14/2003178390/-1/-1/0/CSI_Zero_Trust_User_Pillar_v1.1.PDF
- https://attack.mitre.org/matrices/enterprise/macos/
- https://frischkorn-nicholas.medium.com/red-teaming-macos-101-33b5a1834a2e
- https://redcanary.com/blog/threat-detection/mac-application-bundles/
- https://objectivebythesea.org/v6/talks/OBTS_v6_lRoberts_cHall.pdf
- https://objectivebythesea.org/v6/talks/OBTS_v6_gKalman.pdf
- https://objectivebythesea.org/v5/talks/OBTS_v5_cThomas.pdf
- https://book.hacktricks.xyz/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-library-injection
- https://www.cyberark.com/resources/threat-research-blog/a-deep-dive-into-penetration-testing-of-macos-applications-part-1
- https://www.cyberark.com/resources/threat-research-blog/a-deep-dive-into-penetration-testing-of-macos-applications-part-2
- OBTS v2.0: "Bash-ing Brittle Indicators: Red Teaming macOS without Bash or Python" - Cody Thomas
- https://github.com/tonghuaroot/Awesome-macOS-Red-Teaming
- https://www.sentinelone.com/blog/macos-red-team-spoofing-privileged-helpers-and-others-to-gain-root/
- https://themittenmac.com/what-does-apt-activity-look-like-on-macos/
- DEF CON 23 - Patrick Wardle - DLL Hijacking on OS X
- https://lockboxx.blogspot.com/2019/10/macos-red-teaming-211-dylib-hijacking.html
- https://hadess.io/the-art-of-infection-in-macos/
- https://www.mdsec.co.uk/2021/01/macos-post-exploitation-shenanigans-with-vscode-extensions/
- DEF CON 31 - Demystifying (& Bypassing) macOS's Background Task Management - Patrick Wardle
- https://www.loobins.io/
- https://cloud.hacktricks.xyz/pentesting-ci-cd/github-security
- https://www.synacktiv.com/publications/hijacking-github-runners-to-compromise-the-organization.html
- https://www.oneconsult.com/en/blogs/pentesters-diary/security-in-ci-and-cd-how-to-master-the-owasp-top-10-risks/
- https://bishopfox.com/blog/poisoned-pipeline-attack-execution-a-look-at-ci-cd-environments
- https://research.nccgroup.com/2022/01/13/10-real-world-stories-of-how-weve-compromised-ci-cd-pipelines/
- https://www.schellman.com/blog/cybersecurity/penetration-testing-a-cicd-pipeline
- https://medium.com/@DevSec0ps/ci-cd-and-build-security-tryhackme-thm-write-up-walkthrough-c672b7762cf9
- https://pulsesecurity.co.nz/articles/OMGCICD-gitlab
- https://cheatsheetseries.owasp.org/cheatsheets/CI_CD_Security_Cheat_Sheet.html
- https://cloud.hacktricks.xyz/pentesting-ci-cd/pentesting-ci-cd-methodology
- BSidesSF 2024 - Attacking & Defending Supply Chains. How we got Admin in your Cloud,... (Mike Ruth)
- BSidesSF 2022 - Attacking and Defending Infrastructure with Terraform... (Mike Ruth • Francisco Oca)
- https://www.paloaltonetworks.com/cyberpedia/anatomy-ci-cd-pipeline-attack
- https://www.synacktiv.com/publications/hijacking-github-runners-to-compromise-the-organization.html
- https://media.defense.gov/2023/Jun/28/2003249466/-1/-1/0/CSI_DEFENDING_CI_CD_ENVIRONMENTS.PDF
- https://www.oneconsult.com/en/blogs/pentesters-diary/security-in-ci-and-cd-how-to-master-the-owasp-top-10-risks/
- https://owasp.org/www-project-top-10-ci-cd-security-risks/
- https://medium.com/tinder/exploiting-github-actions-on-open-source-projects-5d93936d189f
- https://www.whiteoaksecurity.com/blog/jenkins-remote-execution-via-malicious-jobs/
- https://github.com/step-security/github-actions-goat
- https://hackingthe.cloud/
- Project Apeman: Mapping AWS Identity Attack Paths - Daniel Heinsen
- https://stratus-red-team.cloud/attack-techniques/AWS/
- https://stratus-red-team.cloud/attack-techniques/GCP/
- https://www.redsentry.com/blog/pentest-redteam-gcp-using-cron-jobs
- https://unit42.paloaltonetworks.com/cloud-virtual-machine-attack-vectors/
- https://cloud.hacktricks.xyz/pentesting-cloud/kubernetes-security
- https://docs.metasploit.com/docs/pentesting/metasploit-guide-kubernetes.html
- https://www.armosec.io/blog/kubernetes-vulnerabilities-2023/
- https://www.microsoft.com/en-us/security/blog/2020/04/02/attack-matrix-kubernetes/
- https://stratus-red-team.cloud/attack-techniques/kubernetes/
- https://github.com/rootsecdev/Azure-Red-Team/blob/master/Kubernetes/Readme.md
- https://gitlab.com/gitlab-com/gl-security/security-operations/redteam/redteam-public/resources/red-team-tech-notes/-/tree/master/K8s-GKE-attack-notes
- https://securitylabs.datadoghq.com/articles/kubehound-identify-kubernetes-attack-paths/
- https://bishopfox.com/blog/kubernetes-pod-privilege-escalation
- https://redteamrecipe.com/100-methods-for-container-attacks
- https://sysdig.com/blog/top-owasp-kubernetes/
- CrikeyCon 2022 - "Alex" - Hiding malware in Docker Desktop's secret virtual machine
- https://irsl.medium.com/sneaky-write-hook-git-clone-to-root-on-k8s-node-e38236205d54
- https://raesene.github.io/blog/2024/07/10/Fun-With-GitRepo-Volumes
- https://objective-see.org/blog.html
- https://media.defcon.org/DEF%20CON%2029/DEF%20CON%2029%20presentations/Cedric%20Owens%20-%20Gone%20Apple%20Pickin%20-%20%20Red%20Teaming%20macOS%20Environments%20in%202021.pdf
- DEF10. I Can See an Apple Behind Your Windows - Red Teaming macOS Environments by Wojciech Reguła
- DEFmacOS Red Teaming in 2023 [0-day edition] at DefCamp 2023
- https://www.huntapples.com/hunt-for-red-apples
- https://objectivebythesea.org/v6/talks/OBTS_v6_gLongo_bWiley.pdf
- https://objectivebythesea.org/v5/talks/OBTS_v5_tReed.pdf
- https://objectivebythesea.org/v5/talks/OBTS_v5_cOwens_cRoss.pdf
- https://book.hacktricks.xyz/macos-hardening/macos-red-teaming
- https://github.com/tonghuaroot/Awesome-macOS-Red-Teaming
- https://redteamrecipe.com/macos-red-teaming
- https://theevilbit.github.io/posts/
- https://elhacker.info/ebooks%20Joas/Red%20Team%20MacOS%20Att_ck%20-%20Overview.pdf
- https://book.hacktricks.xyz/macos-hardening/macos-security-and-privilege-escalation
- macOS Red Teaming 101 - Ricardo Logan // Red Team - Ekoparty 2023
- BSidesSF 2022 - Red Teaming macOS Environments with Hermes the Swift Messenger (Justin Bui)
- https://www.cyberark.com/resources/threat-research-blog/a-deep-dive-into-penetration-testing-of-macos-applications-part-1
- https://www.cyberark.com/resources/threat-research-blog/a-deep-dive-into-penetration-testing-of-macos-applications-part-2
- https://www.cyberark.com/resources/threat-research-blog/a-deep-dive-into-penetration-testing-of-macos-applications-part-3
- https://vsociety.medium.com/cve-2023-26818-macos-tcc-bypass-with-telegram-using-dylib-injection-part1-768b34efd8c4
- Hey, I'm Still In Here: An Overview of macOS Persistence Techniques – Leo Pitt (SO-CON 2020)
- https://gist.github.com/its-a-feature/1a34f597fb30985a2742bb16116e74e0
- https://pentester.land/writeups/
- https://tldrsec.com/t/Newsletter
- Google Security Blog, How effective is basic account hygiene at preventing hijacking