PowerShell Scripting - Basic Concepts and Syntax

This article provides an introduction to PowerShell scripting, including basic concepts and syntax, specific code examples for pen testing and red teaming tasks, and the language’s pros and cons compared to other programming languages in the field.

May 11, 2023 · 7 min · UncleSp1d3r

Mythic: An Introduction to the Open Source Post-Exploitation Framework

Mythic is a powerful, open-source post-exploitation framework that offers red teamers and pen testers an extensible and customizable platform with numerous modules, agents, and C2 profiles to enhance their engagements and achieve objectives in various target environments.

April 22, 2023 · 8 min · UncleSp1d3r

SharpSocks: A .NET-Based Proxy for Red Teaming and Network Penetration Testing

SharpSocks is a powerful .NET-based proxy tool for red teaming and network penetration testing that enables encrypted communications, protocol obfuscation, and access to internal resources, providing professional hackers with stealth and persistence in their engagements.

April 15, 2023 · 5 min · UncleSp1d3r

Covenant: Command and Control for Red Teaming and Post-Exploitation Operations

This article provides a comprehensive guide to using Covenant, a powerful command and control framework for red teaming and post-exploitation operations, covering its architecture, installation, setup, usage, real-world examples, and custom task development for a technical audience.

April 8, 2023 · 7 min · UncleSp1d3r

Nishang: PowerShell Scripts for Penetration Testing and Red Teaming

This article explores Nishang, a collection of PowerShell scripts designed for penetration testing and red teaming, covering its various modules, usage examples, and real-world applications, ultimately demonstrating the tool’s value and versatility for cybersecurity professionals.

April 1, 2023 · 7 min · UncleSp1d3r

PowerSploit: Using PowerShell for Offensive Security Operations

PowerSploit, a collection of PowerShell modules designed for offensive security operations, offers powerful tools for code execution, script modification, persistence, privilege escalation, recon, and exfiltration, enabling penetration testers and red teamers to enhance their skills and stay ahead in the cybersecurity landscape.

March 18, 2023 · 4 min · UncleSp1d3r

PsExec for Remote Code Execution

This article explores what PsExec is, how it works, and how red teamers or pen testers can use it to achieve remote code execution on a target system, including detailed examples and prerequisites.

February 25, 2023 · 6 min · UncleSp1d3r

Remote Execution with sc.exe on Windows: A Red Team Guide

A practical red team guide to remote code execution using sc.exe on Windows—covering payload creation, encoding, service configuration, and execution.

February 24, 2023 · 5 min · UncleSp1d3r

Using DSQuery for Red Teaming: A Guide to Gathering Active Directory Intelligence

Learn how red teamers can leverage DSQuery to enumerate Active Directory environments, with detailed command examples and practical considerations.

February 21, 2023 · 6 min · UncleSp1d3r

Powerful Windows Command-Line Tools for Advanced Red Team Operations

Explore advanced use cases for powerful Windows command-line tools like PowerShell, Netsh, WMIC, and more—tailored for experienced red teamers.

February 20, 2023 · 8 min · UncleSp1d3r