Bestest Red Team

A look at how to create and execute a successful Red Team operation.…

Going Phishing with Terraform

Terraform is a tool for building, changing, and versioning cloud or local infrastructure safely and efficiently. Using Terraform Red Teams can quickly spin up offensive resources.…

7 Tools For Malicious Document Creation

Quick coverage of seven different tools that can be used to generate malicious macro payloads. They can then be embedded into Office documents and used for phishing.…

Using SMBClient to Enumerate Shares

This blog post seeks to demonstrate the vulnerabilities of SMB NULL sessions, and how to test them with smbclient.…

Bow Before the All Powerful CrackMapExec!!

CrackMapExec more commonly referenced as CME is a post-exploitation tool that helps automate assessing the security of Active Directory networks.…