Stealth Cyber Operator [CSCO]
- Red Team Resource Development [Infra Setup]
- Abuse improperly placed and mis-configured security controls in infrastructure
- Trade-craft development for Offensive Operations
- Resource abuse using Windows APIs, C, C++ & Csharp
- Utilizing Trade-craft for Red Teaming in Hardened Environment
- Leveraging Endpoint Security Controls (AV, EDR) & so much more…
Red Team Resource Development
- Enterprise Security Controls Architecture
- Bypassing / Circumventing Initial Access Defenses
- Red Team Infrastructure Development
- Initial Access by Abusing Enterprise Applications
- Custom scripts / code for Operational Security
Trade-craft Development for Offensive Operations
- Hands-on offensive trade-craft development (C# & Windows API)
- Fully Undetectable (FUD) payload creation strategies
- Understanding Microsoft & Linux Based Security Controls
- Defense Evasion Strategies for malware development
Utilizing Trade-craft for Red Teaming in Hardened Environment
- Microsoft based security controls defense evasion
- Circumventing Host & Network based security controls
- Interesting Cross Forest Trust abuse scenario
- Custom ways for credential access in windows & Linux boxes
- Real-World Engagement case scenarios
Blinding Endpoint Defenses [Explicit Edition]
- ETW & EDR Basics
- Deep Diving into endpoint security internals
- Evasion Strategies & Exercises
- FUD ETW & EDR Bypasses
- Enterprise Security Controls Lab Access
Content
Code:
+---Stealth Cyber Operator CSCO
ª Day 2 part-1.mp4
ª Day 2 part-2.mp4
ª Day-1.mp4
ª Day-3.mp4
ª HTDark.CoM.txt
ª Red-Team-Training.pdf
ª StealthOps_Red_Team_Tradecraft_Targeting_Enterprise_Security_Controls.pdf
ª
+---StealthOps (lab code+pdfs)
+---StealthOps
Codes.zip
Codes_Pass.txt
Day-1 StealthOps Feb.pdf
Day-2 StealthOps Feb.pdf
Day-3 StealthOps Feb.pdf