Python - Python C Extensions: Writing High-Performance Extensions in C

Unlock the full potential of your Python code by diving into Python C extensions, boosting performance for critical tasks with practical examples tailored for pen testers and red teams.

July 11, 2024 · 7 min · UncleSp1d3r

Rust Concurrency: Techniques for Writing Concurrent and Parallel Programs

Learn how to write concurrent and parallel programs in Rust, explore advanced concurrency techniques, and discover how Rust can be used in pen testing and red teaming scenarios. Compare Rust with other languages commonly used in the security field.

May 23, 2024 · 6 min · UncleSp1d3r

Red Teaming - Advanced Physical Security Bypass Techniques

Mastering advanced physical security bypass techniques is essential for any red teamer, providing a significant edge in testing and enhancing an organization’s overall security posture through a blend of technical skills, social engineering, and creative problem-solving.

May 20, 2024 · 6 min · UncleSp1d3r

JavaScript - Building Real-Time Applications with Socket.io

This article explores the use of JavaScript and Socket.io for building real-time applications, with a focus on techniques and examples relevant to penetration testing and red teaming, while highlighting the pros and cons of using JavaScript in these scenarios.

May 9, 2024 · 6 min · UncleSp1d3r

Red Teaming - OSINT Techniques for Social Engineering

Explore the power of OSINT in Red Teaming. Dive into techniques like social network profiling, dorking, and domain recon to bolster your social engineering skills. 🚀

August 14, 2023 · 4 min · UncleSp1d3r

Red Teaming - Physical Security Bypass Techniques

Explore advanced physical security bypass techniques, including lock picking, key duplication, RFID exploitation, access control system bypass, and social engineering, for red teaming and pen testing.

June 5, 2023 · 12 min · UncleSp1d3r

BloodHound: Analyzing Active Directory for Security Risks and Attack Paths

BloodHound is a powerful tool for analyzing Active Directory environments, helping red teamers and pen testers visualize complex relationships, identify security risks and attack paths, and develop effective mitigation strategies to strengthen an organization’s security posture.

April 29, 2023 · 8 min · UncleSp1d3r

Mythic: An Introduction to the Open Source Post-Exploitation Framework

Mythic is a powerful, open-source post-exploitation framework that offers red teamers and pen testers an extensible and customizable platform with numerous modules, agents, and C2 profiles to enhance their engagements and achieve objectives in various target environments.

April 22, 2023 · 8 min · UncleSp1d3r

SharpSocks: A .NET-Based Proxy for Red Teaming and Network Penetration Testing

SharpSocks is a powerful .NET-based proxy tool for red teaming and network penetration testing that enables encrypted communications, protocol obfuscation, and access to internal resources, providing professional hackers with stealth and persistence in their engagements.

April 15, 2023 · 5 min · UncleSp1d3r

Covenant: Command and Control for Red Teaming and Post-Exploitation Operations

This article provides a comprehensive guide to using Covenant, a powerful command and control framework for red teaming and post-exploitation operations, covering its architecture, installation, setup, usage, real-world examples, and custom task development for a technical audience.

April 8, 2023 · 7 min · UncleSp1d3r