#RedTeam

Alonso Caballero / ReYDeSAlonso_ReYDeS@infosec.exchange
2026-02-06
๐Ÿ›ก๏ธ Encontrar Koha Library System utilizando Google ๐ŸŒ https://www.reydes.com/e/Encontrar_Koha_Library_System_utilizando_Google #cybersecurity #hacking #redteam #forensics #dfir #osint
Alonso Caballero / ReYDeSAlonso_ReYDeS@infosec.exchange
2026-02-05
๐Ÿ›ก๏ธ Encontrar GlobalProtect Palo Alto Networks utilizando Google ๐ŸŒ https://www.reydes.com/e/Encontrar_GlobalProtect_Palo_Alto_Networks_utilizando_Google #cybersecurity #hacking #redteam #forensics #dfir #osint
2026-02-04

CustomDpapi: Calling the undocumented DPAPI RPC interface directly, no more calling public CryptUnprotectData! github.com/EvilBytecode/Custom #redteam

Alonso Caballero / ReYDeSAlonso_ReYDeS@infosec.exchange
2026-02-04
๐Ÿ›ก๏ธ Encontrar Check Point SSL Network Extender utilizando Google ๐ŸŒ https://www.reydes.com/e/Encontrar_Check_Point_SSL_Network_Extender_utilizando_Google #cybersecurity #hacking #redteam #forensics #dfir #osint
2026-02-03
2026-02-03

๐Ÿ‹๏ธ ๐—ก๐—ผ๐—ฟ๐˜๐—ต๐—ฆ๐—ฒ๐—ฐ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ ๐—™๐—ผ๐—ฟ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€/๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด๐˜€ (๐Ÿญ/๐Ÿญ๐Ÿฎ) : "Red Team Training" ๐—ฝ๐—ฎ๐—ฟ/๐—ฏ๐˜† Charles F. Hamilton from CYPFER

๐Ÿ“… Dates: May 12 and 13 2025 (2 days)
๐ŸŽฏ Level: Medium

Description: "๐˜›๐˜ฉ๐˜ฆ ๐˜ต๐˜ณ๐˜ข๐˜ช๐˜ฏ๐˜ช๐˜ฏ๐˜จ ๐˜ช๐˜ด ๐˜ฅ๐˜ช๐˜ท๐˜ช๐˜ฅ๐˜ฆ๐˜ฅ ๐˜ช๐˜ฏ๐˜ต๐˜ฐ ๐˜ง๐˜ช๐˜ท๐˜ฆ ๐˜ด๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด: ๐˜๐˜ฏ๐˜ช๐˜ต๐˜ช๐˜ข๐˜ญ ๐˜๐˜ฐ๐˜ฐ๐˜ต๐˜ฉ๐˜ฐ๐˜ญ๐˜ฅ, ๐˜Ž๐˜ข๐˜ช๐˜ฏ๐˜ช๐˜ฏ๐˜จ ๐˜ˆ๐˜ค๐˜ค๐˜ฆ๐˜ด๐˜ด, ๐˜–๐˜ง๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜Š๐˜ฐ๐˜ฅ๐˜ช๐˜ฏ๐˜จ, ๐˜๐˜ฏ๐˜ต๐˜ฆ๐˜ณ๐˜ฏ๐˜ข๐˜ญ ๐˜™๐˜ฆ๐˜ค๐˜ฐ๐˜ฏ๐˜ฏ๐˜ข๐˜ช๐˜ด๐˜ด๐˜ข๐˜ฏ๐˜ค๐˜ฆ, ๐˜ข๐˜ฏ๐˜ฅ ๐˜“๐˜ข๐˜ต๐˜ฆ๐˜ณ๐˜ข๐˜ญ ๐˜”๐˜ฐ๐˜ท๐˜ฆ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต. ๐˜Œ๐˜ข๐˜ค๐˜ฉ ๐˜ด๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ธ๐˜ช๐˜ญ๐˜ญ ๐˜ฃ๐˜ฆ ๐˜ค๐˜ฐ๐˜ท๐˜ฆ๐˜ณ๐˜ฆ๐˜ฅ ๐˜ช๐˜ฏ ๐˜ฅ๐˜ฆ๐˜ฑ๐˜ต๐˜ฉ, ๐˜ฑ๐˜ณ๐˜ฐ๐˜ท๐˜ช๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ต๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ช๐˜ค๐˜ข๐˜ญ ๐˜ฆ๐˜ท๐˜ช๐˜ฅ๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ ๐˜ฐ๐˜ง ๐˜ฉ๐˜ฐ๐˜ธ ๐˜ฆ๐˜ข๐˜ค๐˜ฉ ๐˜ต๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ช๐˜ฒ๐˜ถ๐˜ฆ ๐˜ธ๐˜ฐ๐˜ณ๐˜ฌ๐˜ด ๐˜ฃ๐˜ฆ๐˜ฉ๐˜ช๐˜ฏ๐˜ฅ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ด๐˜ค๐˜ฆ๐˜ฏ๐˜ฆ๐˜ด. ๐˜™๐˜ฆ๐˜ฅ ๐˜ต๐˜ฆ๐˜ข๐˜ฎ ๐˜ฆ๐˜น๐˜ฆ๐˜ณ๐˜ค๐˜ช๐˜ด๐˜ฆ๐˜ด ๐˜ธ๐˜ช๐˜ญ๐˜ญ ๐˜ฃ๐˜ฆ ๐˜ฑ๐˜ฆ๐˜ณ๐˜ง๐˜ฐ๐˜ณ๐˜ฎ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฐ ๐˜ข๐˜ด๐˜ด๐˜ฆ๐˜ด๐˜ด ๐˜ณ๐˜ฆ๐˜ด๐˜ฑ๐˜ฐ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ๐˜ฏ๐˜ฆ๐˜ด๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฅ๐˜ฆ๐˜ต๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ค๐˜ข๐˜ฑ๐˜ข๐˜ฃ๐˜ช๐˜ญ๐˜ช๐˜ต๐˜ช๐˜ฆ๐˜ด. ๐˜ˆ๐˜ด ๐˜ข ๐˜ณ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฆ๐˜ข๐˜ฎ๐˜ฆ๐˜ณ, ๐˜ช๐˜ต ๐˜ช๐˜ด ๐˜ช๐˜ฎ๐˜ฑ๐˜ฐ๐˜ณ๐˜ต๐˜ข๐˜ฏ๐˜ต ๐˜ต๐˜ฐ ๐˜ถ๐˜ฏ๐˜ฅ๐˜ฆ๐˜ณ๐˜ด๐˜ต๐˜ข๐˜ฏ๐˜ฅ ๐˜ธ๐˜ฉ๐˜ข๐˜ต ๐˜ฆ๐˜ข๐˜ค๐˜ฉ ๐˜ต๐˜ฐ๐˜ฐ๐˜ญ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ค๐˜ฐ๐˜ฎ๐˜ฎ๐˜ข๐˜ฏ๐˜ฅ ๐˜บ๐˜ฐ๐˜ถ ๐˜ถ๐˜ด๐˜ฆ ๐˜ช๐˜ด ๐˜ฅ๐˜ฐ๐˜ช๐˜ฏ๐˜จ ๐˜ฃ๐˜ฆ๐˜ฉ๐˜ช๐˜ฏ๐˜ฅ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ด๐˜ค๐˜ฆ๐˜ฏ๐˜ฆ๐˜ด ๐˜ต๐˜ฐ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ท๐˜ช๐˜ฅ๐˜ฆ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ฑ๐˜ฆ๐˜ณ ๐˜จ๐˜ถ๐˜ช๐˜ฅ๐˜ข๐˜ฏ๐˜ค๐˜ฆ. ๐˜Œ๐˜น๐˜ฑ๐˜ฆ๐˜ค๐˜ต ๐˜ต๐˜ฐ ๐˜ฑ๐˜ฆ๐˜ณ๐˜ง๐˜ฐ๐˜ณ๐˜ฎ ๐˜ค๐˜ฐ๐˜ฅ๐˜ฆ ๐˜ณ๐˜ฆ๐˜ท๐˜ช๐˜ฆ๐˜ธ๐˜ด, ๐˜ฏ๐˜ฆ๐˜ต๐˜ธ๐˜ฐ๐˜ณ๐˜ฌ ๐˜ข๐˜ฏ๐˜ข๐˜ญ๐˜บ๐˜ด๐˜ช๐˜ด, ๐˜ค๐˜ฐ๐˜ฅ๐˜ฆ ๐˜ฃ๐˜ฆ๐˜ฉ๐˜ข๐˜ท๐˜ช๐˜ฐ๐˜ณ ๐˜ข๐˜ฏ๐˜ข๐˜ญ๐˜บ๐˜ด๐˜ช๐˜ด, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ธ๐˜ณ๐˜ช๐˜ต๐˜ฆ ๐˜ค๐˜ฐ๐˜ฅ๐˜ฆ ๐˜ต๐˜ฐ ๐˜ฆ๐˜ฏ๐˜ฉ๐˜ข๐˜ฏ๐˜ค๐˜ฆ ๐˜บ๐˜ฐ๐˜ถ๐˜ณ ๐˜ณ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฆ๐˜ข๐˜ฎ ๐˜ค๐˜ข๐˜ฑ๐˜ข๐˜ฃ๐˜ช๐˜ญ๐˜ช๐˜ต๐˜ช๐˜ฆ๐˜ด."

About the trainer:
Charles F. Hamilton (Mr.Un1k0d3r) - Red Teamer with 10+ years experience delivering offensive testing services. Founder of RingZer0 Team website with 50,000+ members worldwide teaching hacking fundamentals. Prolific toolsmith and trainer who has delivered this training 20+ times. Specializes in covert Red Team operations in highly secured environments.

๐Ÿ”— Get your ticket now to benefit from this world-class training: nsec.io/training-sessions/

#NorthSec #cybersecurity #infosec #redteam #activedirectory #EDR

2026-02-03

An open-source port/reimplementation of the Cobalt Strike BOF Loader github.com/CodeXTF2/Cobaltstri #redteam

2026-02-03

Indirect Syscall with Acheron in Golang (Bypass Windows Defender on Windows 11)

youtube.com/watch?v=-SXX0-LdSFI

#cybersecurity #exploit #redteam

Kevin Karhan :verified:kkarhan@infosec.space
2026-01-30

@BrideOfLinux THIS is why one has explicit comms prepared to get released immediately.

#RedTeam #RedTeaming #Pentesting #PhysicalSecurity #Itsec #InfoSec #OpSec #ComSec

2026-01-30

Just stumbled upon Phishing Club, looks like a decent successor to Gophish!
github.com/phishingclub/phishi
#phishing #redteam

2026-01-30

GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Microsoft SharePoint Document.

github.com/looCiprian/GC2-sheet

#infosec #cybersecurity #redteam #pentest #threatintel #dfir

2026-01-29

TaskHound hunts privileged Windows scheduled tasks and exports them for BloodHound attack path analysis.

github.com/1r0BIT/TaskHound

#infosec #pentesting #redteam

Black Lantern Security (BLSOPS)BlackLanternLLC@infosec.exchange
2026-01-29

๐Ÿšจ TREVORspray 2.4 drops w/ TENANT ENUM!
Big thanks to Sprocket Security for uncovering the secret API โ€” details: sprocketsecurity.com/blog/tena
Update to the latest version with pipx upgrade trevorspray
Spray smarter, not harder. #RedTeam #InfoSec

2026-01-29

This project maintains a list of binaries natively available in Proxmox VE that can be leveraged by adversaries during red team operations

lolprox.yxz.red

#infosec #cybersecurity #redteam #pentest

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst