Advertisement
savsanta

READINGMATERIALS

Feb 16th, 2024 (edited)
66
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.59 KB | None | 0 0
  1. Japanese Mexican Food Topic -https://www.instagram.com/reel/C6l045yu6lZ/?igsh=MTAwZ2Rsem90dnp3eA==
  2.  
  3. https://bohops.com/2017/12/02/trust-direction-an-enabler-for-active-directory-enumeration-and-trust-exploitation/
  4.  
  5. https://posts.specterops.io/on-detection-tactical-to-functional-f37c9b0b8874
  6. https://learn.microsoft.com/en-us/windows/win32/adschema/a-sidhistory
  7. https://blog.trailofbits.com/2023/11/22/etw-internals-for-security-research-and-forensics/
  8. https://unit42.paloaltonetworks.com/what-i-learned-from-reverse-engineering-windows-containers/
  9. https://www.mdsec.co.uk/2024/02/active-directory-enumeration-for-red-teams/
  10. https://ctovswild.com/2009/09/03/bitmask-searches-in-ldap/
  11.  
  12. https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-crtd/ec71fd43-61c2-407b-83c9-b52272dec8a1
  13. https://www.ultimatewindowssecurity.com/blog/default.aspx
  14. https://github.com/daem0nc0re/Abusing_Weak_ACL_on_Certificate_Templates
  15. https://blog.trailofbits.com/2023/11/22/etw-internals-for-security-research-and-forensics/
  16. https://blog.tofile.dev/2022/11/30/kdu_sealighter.html
  17. https://cyberstoph.org/posts/2022/03/detecting-shadow-credentials/
  18. https://github.com/FalconForceTeam/BOF2shellcode
  19. https://github.com/anthemtotheego/InlineExecute-Assembly
  20. https://blog.netwrix.com/2021/08/25/running-laps-in-the-race-to-security/
  21.  
  22. https://devblogs.microsoft.com/oldnewthing/20050214-00/?p=36463
  23. https://github.com/xuanxuan0/DripLoader/blob/master/DripLoader/DripLoader.cpp
  24. https://oldboy21.github.io/posts/2024/02/reflective-dll-got-indirect-syscall-skills/
  25. https://github.com/fin3ss3g0d/NativeThreadpool
  26. ---
  27. https://avred.r00ted.ch/
  28. https://github.com/netero1010/EDRSilencer
  29. https://github.com/TheD1rkMtr/DocPlz
  30. https://www.safebreach.com/blog/defender-pretender-when-windows-defender-updates-become-a-security-risk/
  31. https://i.blackhat.com/us-18/Thu-August-9/us-18-Bulazel-Windows-Offender-Reverse-Engineering-Windows-Defenders-Antivirus-Emulator.pdf
  32. https://www.french365connection.co.uk/post/mde-keeping-your-antivirus-up-to-date-deep-dive
  33. https://adamsvoboda.net/extracting-asr-rules/
  34. https://medium.com/tenable-techblog/stealthy-persistence-privesc-in-entra-id-by-using-the-federated-auth-secondary-token-signing-cert-876b21261106
  35. https://www.tenable.com/security/research/tra-2020-08
  36. https://medium.com/tenable-techblog/bypass-windows-10-user-group-policy-and-more-with-this-one-weird-trick-552d4bc5cc1b
  37.  
  38. https://posts.specterops.io/not-a-security-boundary-breaking-forest-trusts-cd125829518d
  39. https://www.youtube.com/watch?v=cN_CzC9KfZw - Not a Security Boundary Bypassing UAC
  40. https://posts.specterops.io/a-red-teamers-guide-to-gpos-and-ous-f0d03976a31e
  41.  
  42.  
  43. https://t.me/c/1365432225/8312 - xorpd | Assembly Language Adventures
  44. https://t.me/c/1365432225/8309 - Practical Linux for Penetrating & Bug Bounties
  45. https://t.me/c/1365432225/8227 - Red Team: Getting Access w/ Michael Allen
  46. https://t.me/c/1365432225/8216 - Modern WebApp Pentesting w/ BB King
  47. https://t.me/c/1365432225/8214 - Breaching the Cloud w/ Beau Bullock
  48.  
  49. https://t.me/c/1365432225/8210 - Applied Purple Teaming w/ Kent Ickler and Jordan Drysdale
  50. https://t.me/c/1365432225/8085 - Pentester Academy - Windows System Programming: Security 2022
  51. https://t.me/c/1365432225/8005 - Udemy | Android App Hacking - Black Belt Edition
  52. https://t.me/c/1365432225/7868 - Active Directory Protection & Tiering
  53. https://t.me/c/1365432225/6827 - ZeroToMastery Academy | Rust Programming: The Complete Developer's Guide
  54. ----
  55. https://www.harmj0y.net/blog/
  56. https://www.slideshare.net/AndyRobbins3/here-be-dragons-the-unexplored-land-of-active-directory-acls
  57. https://www.slideshare.net/DanielLpezJimnez1/understanding-and-hiding-your-operations
  58. https://www.slideshare.net/harmj0y/derbycon-the-unintended-risks-of-trusting-active-directory
  59. https://www.slideshare.net/harmj0y/not-a-security-boundary
  60.  
  61.  
  62. https://www.slideshare.net/DanielLpezJimnez1/understanding-and-hiding-your-operations
  63. https://www.slideshare.net/JasonLang1/red-team-methodology-a-naked-look-169879355
  64. https://www.slideshare.net/ChandrapalBN/dangling-dns-records-takeover-at-scale
  65.  
  66.  
  67. https://www.slideshare.net/harmj0y/catch-me-if-you-can-powershell-red-vs-blue
  68. https://www.slideshare.net/PatrickCoble3/derbycon-7-hacking-vdi-recon-and-attack-methods
  69.  
  70.  
  71. https://github.com/matthieu-hackwitharts/Win32_Offensive_Cheatsheet?tab=readme-ov-file#virtualprotect-technique
  72. https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md
  73. https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/PrivescPostEx.md
  74. https://media.defense.gov/2023/May/24/2003229517/-1/-1/0/CSA_Living_off_the_Land.PDF
  75.  
  76.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement