PowerShell Scripting - Basic Concepts and Syntax

This article provides an introduction to PowerShell scripting, including basic concepts and syntax, specific code examples for pen testing and red teaming tasks, and the language’s pros and cons compared to other programming languages in the field.

May 11, 2023 · 7 min · UncleSp1d3r

Mythic: An Introduction to the Open Source Post-Exploitation Framework

Mythic is a powerful, open-source post-exploitation framework that offers red teamers and pen testers an extensible and customizable platform with numerous modules, agents, and C2 profiles to enhance their engagements and achieve objectives in various target environments.

April 22, 2023 · 8 min · UncleSp1d3r

SharpSocks: A .NET-Based Proxy for Red Teaming and Network Penetration Testing

SharpSocks is a powerful .NET-based proxy tool for red teaming and network penetration testing that enables encrypted communications, protocol obfuscation, and access to internal resources, providing professional hackers with stealth and persistence in their engagements.

April 15, 2023 · 5 min · UncleSp1d3r

Covenant: Command and Control for Red Teaming and Post-Exploitation Operations

This article provides a comprehensive guide to using Covenant, a powerful command and control framework for red teaming and post-exploitation operations, covering its architecture, installation, setup, usage, real-world examples, and custom task development for a technical audience.

April 8, 2023 · 7 min · UncleSp1d3r

Nishang: PowerShell Scripts for Penetration Testing and Red Teaming

This article explores Nishang, a collection of PowerShell scripts designed for penetration testing and red teaming, covering its various modules, usage examples, and real-world applications, ultimately demonstrating the tool’s value and versatility for cybersecurity professionals.

April 1, 2023 · 6 min · UncleSp1d3r

PowerSploit: Using PowerShell for Offensive Security Operations

PowerSploit, a collection of PowerShell modules designed for offensive security operations, offers powerful tools for code execution, script modification, persistence, privilege escalation, recon, and exfiltration, enabling penetration testers and red teamers to enhance their skills and stay ahead in the cybersecurity landscape.

March 18, 2023 · 8 min · UncleSp1d3r

Psexec for Remote Code Execution

This article explores what PsExec is, how it works, and how red teamers or pen testers can use it to achieve remote code execution on a target system, with examples and prerequisites.

February 25, 2023 · 6 min · UncleSp1d3r

Using sc.exe on Windows for Remote Execution

Detailed guide for advanced red teams on using sc.exe for remote execution on Windows, including payload creation, encoding, and service initiation.

February 24, 2023 · 5 min · UncleSp1d3r

Using DSQuery for Red Team: A Guide to Gathering Information on Active Directory Environments

Explore how Red Team members use DSQuery to gather info on Active Directory environments, including specific examples and considerations.

February 21, 2023 · 6 min · UncleSp1d3r

Powerful Windows Systems Administration Command-Line Tools for Advanced Red Team Members

Dive into advanced use cases for powerful Windows command-line tools like PowerShell, Netsh, and more, targeted at Red Team members.

February 20, 2023 · 8 min · UncleSp1d3r