Red teaming can be defined as the process of testing your cybersecurity effectiveness through the removal of defender bias by applying an adversarial lens to your organization.
Red teaming occurs when ethical hackers are authorized by your organization to emulate real attackers’ tactics, techniques and procedures (TTPs) against your own systems.
- Bypass Application Whitelisting
- FTP > Path Traversal > CVE
- Inject Macros from a Remote
- Password Spraying OWA > Remote Shell
- Redis Exploitation
All content of this repository will always be updated...