• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

red

  1. dEEpEst

    Montar un VPS de proxy inverso en la red TOR para mostrar el contenido de otro VPS en la Clearnet

    Este proyecto tiene como objetivo configurar un servidor VPS como un proxy inverso en la red TOR para mostrar el contenido de otro VPS en la clearnet. Utiliza Nginx como servidor web y proxy inverso, junto con un certificado SSL autofirmado generado por OpenSSL para proporcionar cifrado y...
  2. N

    Red Team Guides (HADESS.IO)

    Red Teaming is the process of using tactics, techniques, and procedures (TTPs) to emulate real-world threats to train and measure the effectiveness of the people, processes, and technology used to defend environments. Built on the fundamentals of penetration testing, Red Teaming uses a...
  3. dEEpEst

    Sandman is a NTP based backdoor for red team engagements in hardened networks.

    Sandman is a NTP based backdoor for red team engagements in hardened networks. Sandman is a backdoor that is meant to work on hardened networks during red team engagements. Sandman works as a stager and leverages NTP (a protocol to sync time & date) to get and run an...
  4. itsMe

    Use Kali Linux like a hacker with Red Team Tactics

    Description What is ethical hacking? Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security...
  5. itsMe

    RedTeam Tools - Tools and Techniques for Red Team / Penetration Testing

    Collection of 100+ tools and resources that can be useful for red teaming activities. Some of the tools may be specifically designed for red teaming, while others are more general-purpose and can be adapted for use in a red teaming context. Warning The materials in this repository are for...
  6. dEEpEst

    Cómo auditar la red de una empresa grande: Pasos para un pentester

    Este artículo explica los pasos que debe seguir un pentester para auditar la red de una empresa grande con más de 400 ordenadores. Desde la recopilación de información hasta la evaluación continua, se describen los pasos necesarios para asegurar la seguridad de la red. Introducción El...
  7. itsMe

    The all-in-one Red Team browser extension for Web Pentesters v0.5

    The all-in-one Red Team browser extension for Web Pentesters HackTools is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverses shells, and much more. Current functions:    ...
  8. itsMe

    Wifi Hacking Series For Red Teamers & Pentesters

    Description Wireless Penetration Testing Pentesting of the wireless systems is easier task than doing that on the wired network. You cannot really apply good physical security measures against a wireless medium, if you are located close enough, you are able to “hear” (or at least your wireless...
  9. dEEpEst

    Cómo proteger su red contra el hacking: Una guía completa sobre qué es el hacking de red y cómo prevenirlo

    Aprenda sobre el hacking de red y los peligros que conlleva en la era digital. Descubra las mejores prácticas y medidas de seguridad para proteger su red y sus datos sensibles. Introducción: En un mundo cada vez más conectado, la seguridad de las redes es esencial para proteger los datos y la...
  10. itsMe

    .NET Red Gate SmartAssembly Professional 8.1.2.4975

    Protect your .NET code and IP with SmartAssembly     Protect intellectual property through obfuscation and encryption     Secure .NET Framework, .NET Core, and .NET Standard assemblies     Automatically report usage and exceptions Redgate's .NET obfuscator SmartAssembly is an obfuscator...
  11. itsMe

    Sandman: NTP based backdoor for red team engagements

    Sandman is a backdoor that is meant to work on hardened networks during red team engagements. Sandman works as a stager and leverages NTP (a protocol to sync time & date) to get and run an arbitrary shellcode from a pre defined server. Since NTP is a protocol that is overlooked by many...
  12. itsMe

    .NET Exe To Red Pixels + VIDEO

    Hidden content
  13. itsMe

    The all-in-one Red Team browser extension for Web Pentesters v0.4

    Pentesters HackTools is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverses shells, and much more. Current functions:     Dynamic Reverse Shell generator (PHP, Bash, Ruby...
  14. itsMe

    Active Directory Pentesting With Kali Linux – Red Team

    Active Directory Pentesting With Kali Linux – Red Team Attacking and Hacking Active Directory With Kali Linux Full Course – Red Team Hacking Pentesting What you’ll learn     How to Use Metasploit to Exploit Active Directory     How to Use Empire to Exploit Active Directory     How to Use...
  15. itsMe

    Ultimate Ethical Hacking Using Kali Linux Red Team Tactics

    Description What is ethical hacking? Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security...
  16. itsMe

    .NET Red Gate SmartAssembly Professional 8.1.0.4892

    Protect your .NET code and IP with SmartAssembly     Protect intellectual property through obfuscation and encryption     Secure .NET Framework, .NET Core, and .NET Standard assemblies     Automatically report usage and exceptions Redgate's .NET obfuscator SmartAssembly is an obfuscator that...
  17. D

    X1 XVIDEOS RED ACCOUNT US LOCATION

    Hidden content
  18. itsMe

    OffensiveRust: Rust Weaponization for Red Team Engagements

    OffensiveRust My experiments in weaponizing Rust for implant development and general offensive operations. Why Rust?     It is faster than languages like C/C++     It is a multi-purpose language, bearing excellent communities     It has an amazing inbuilt dependency build management called...
  19. D

    X1 XVIDEOS RED ACCOUNT GERMANY LOCATION

    Hidden content
  20. itsMe

    .NET Red Gate SmartAssembly Professional 8.0.4.4860

    Protect your .NET code and IP with SmartAssembly     Protect intellectual property through obfuscation and encryption     Secure .NET Framework, .NET Core, and .NET Standard assemblies     Automatically report usage and exceptions Redgate's .NET obfuscator SmartAssembly is an obfuscator that...
Back
Top