• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

redteam

  1. dEEpEst

    SEC540: Cloud Native Security and DevSecOps Automation 2025 31GB

    The SANS SEC540 DevSecOps training course prepares security professionals to secure cloud-native and DevOps environments by implementing security controls in automated pipelines. It addresses challenges like insecure CI/CD pipelines, misconfigurations, and Kubernetes vulnerabilities while...
  2. dEEpEst

    CodeMachine - Windows Malware Techniques 11GB 2021

    Windows Malware Techniques Description User mode malware on Windows is ubiquitous and custom user mode implants are used regularly in red-team engagements. Knowledge of the latest malware techniques helps red teamers improve their custom tooling, malware analysts in taking apart malware, and...
  3. dEEpEst

    TCM Security - Assembly 101 2025-04-19 3GB

    Course Overview Welcome to Assembly 101! This course will teach you how computers work down to the lowest level and how to write and read the human readable version of the 1s and 0s they speak in - Assembly. The course starts with an introduction on how computers perform computations using...
  4. dEEpEst

    PEN-300: Advanced Evasion Techniques and Breaching Defenses 2025.4

    PEN-300: Advanced Evasion Techniques and Breaching Defenses Building on the skills acquired in PEN-200, OffSec’s PEN-300 course explores advanced penetration testing techniques against hardened targets. Learners gain hands-on experience bypassing security defenses and crafting custom exploits...
  5. dEEpEst

    Hacking 🎩 Blind OS Command Injection: The Ultimate Mega-Guide

    🎩 Blind OS Command Injection: The Ultimate Mega-Guide 🚀 Created for Hack Tools Dark Community By Hack Tools Dark Community — Deep Offensive Security Knowledge Welcome to a full in-depth exploration on exploiting Blind OS Command Injection, covering basic detection, advanced exploitation...
  6. dEEpEst

    Certified Windows Red Team Lab (CRTE) 5 GB 2025

    CRTE Course Objective: Most enterprise networks today are managed using Active Directory and it is imperative for a security professional to understand the threats to the Windows infrastructure. Our Certified Red Team Expert (CRTE) course and lab is designed to provide a platform for security...
  7. dEEpEst

    Advanced Drive-By-Download Attack

    Advanced Drive-By-Download Attack: Red Team PoC and Blue Team Defense Strategies Introduction A Drive-By-Download attack is a sophisticated exploitation technique where a victim unknowingly downloads and executes a malicious payload simply by visiting a compromised or malicious website. Unlike...
  8. dEEpEst

    Top 10 Hacking Techniques Against Window

    Top 10 Hacking Techniques Against Windows: Red Team vs. Blue Team Perspective Windows remains the most widely used operating system worldwide, making it a prime target for cyberattacks. Threat actors, from script kiddies to advanced persistent threats (APTs), continuously exploit its weaknesses...
  9. dEEpEst

    OffSec - TH-200 OSTH 2025

    TH-200: Foundational Threat Hunting OffSec’s Foundational Threat Hunting (TH-200) equips cybersecurity professionals with the practical skills and knowledge needed to effectively detect and respond to threats. This course covers core threat hunting concepts, exploring the methodologies used by...
  10. dEEpEst

    OffSec - IR-200 OSIR 2025

    IR-200: Foundational Incident Response OffSec’s Incident Response Essentials (IR-200) course provides cybersecurity professionals with practical training to prepare for, identify, and handle security incidents effectively. The course focuses on core incident response concepts and explores how...
  11. dEEpEst

    Red Team Techniques: Server and Network

    Comprehensive Guide to Red Team Techniques: Server and Network Penetration Introduction Red teaming simulates a real-world cyberattack to test an organization’s defenses. This guide focuses on practical, hands-on examples of common red team techniques, from gaining initial access to escalating...
  12. dEEpEst

    Pentest Find XSS Vulnerabilities in Just 2 Minutes

    Find XSS Vulnerabilities in Just 2 Minutes The process is very simple and efficient. The first step is to copy the target website URL. Now that we know the target, the next step will be to execute a very simple, yet powerful one-liner command that streamlines the testing process. Here’s how it...
  13. dEEpEst

    Red Team e Blue Team 451 files

    This is the base 2 that you also need to know, and finally define which path you are going to follow, be it Blue Team or Red Team, because within each one there is a certain Segment. Think, which area would I do well? Attack or defend? And what do I need to qualify in these two areas, what does...
  14. dEEpEst

    eCPPT v2 15 GB - 2024

    eCPPT Certification Certified Professional Penetration Tester eCPPT is a 100% practical and highly respected Ethical Hacking and Penetration Testing Professional certification counting certified professionals in all seven continents. More info: [4.0K] . ├── [4.0K] 1. System Security │...
  15. dEEpEst

    Pentest How to exploit open ports using Metasploit

    🛡 How to exploit open ports using Metasploit🧑‍💻 It requires knowledge of the basics of cybersecurity, as well as knowing how to use the tools effectively, I will explain the basic steps for this with a practical example. ✅ ### Basic steps to exploit open ports using Metasploit: 1️⃣ Collecting...
  16. dEEpEst

    In-Depth Red Teaming: APT & Adversary Simulation 6 GB 2024

    In-Depth Red Teaming: APT & Adversary Simulation This is an on-demand full hands-on training that focuses on developing cyber weapons that can evade AV detection, EDR logs and forensics traces like how advanced targeted attacks do, and provide you with insights on how to improve your...
  17. dEEpEst

    Applied Purple Teaming w/ Kent Ickler and Jordan Drysdale 4GB + LABS

    You’ve heard this story before. Bad actor walks into a network and pillages the place in swift action. CIO asks: “Where did we go wrong?” SysAdmin replies “our password, remote access, workstation restriction, and lack of application safelisting policies. Oh, and our SIEM didn’t notify us. We...
  18. dEEpEst

    Courses How To Rob a Casino

    Credits: dmcxblue Casinos, some view these places as something that corrupts the soul, leading individuals astray with the allure of easy money and instant gratification. Others see casinos as an escape from reality, seeking temporary relief from stress, boredom or dissatisfaction and for...
  19. dEEpEst

    Courses 0-Click ATO: How I Can Take Over Every Account on the Website

    Som3a Says: Hello, Hackers! I hope you’re all doing well. This is my first write-up and also my first Valid Bug, and I wanted to share it with you. If there are any mistakes, please let me know in the comments. Whoami? My name is Ahmed Esmail, or you can call me “Som3a”. I’m 20 years old, and I...
  20. dEEpEst

    Exploits CVE- 2024-48990 : Linux LPE via needrestart

    CVE- 2024-48990 : Linux LPE via needrestart PATCHED: Nov 19, 2024 PoC: -=Stripped Content=- Info: -=Stripped Content=- P.S. Although you need to wait for needrestart to run for the add-on (which starts, for example, with apt upgrade ), the patch is only three days old, and it has not yet...
Back
Top