Browse Skills
Exploiting Api Injection Vulnerabilities
v1.0.0>
Exploiting Active Directory With Bloodhound
v1.0.0BloodHound is a graph-based Active Directory reconnaissance tool that uses graph theory to reveal hidden and unintended relationships within AD environments. Red teams use BloodHound to identify attac
Exploiting Active Directory Certificate Services Esc1
v1.0.0Exploit misconfigured Active Directory Certificate Services (AD CS) ESC1 vulnerability to request certificates as high-privileged users and escalate domain privileges during authorized red team assessments.
Executing Red Team Exercise
v1.0.0>
Executing Red Team Engagement Planning
v1.0.0Red team engagement planning is the foundational phase that defines scope, objectives, rules of engagement (ROE), threat model selection, and operational timelines before any offensive testing begins.
Executing Phishing Simulation Campaign
v1.0.0>
Executing Diamond Model Analysis
v1.0.0>
Executing Active Directory Attack Simulation
v1.0.0>
Evaluating Threat Intelligence Platforms
v1.0.0>
Eradicating Malware From Infected Systems
v1.0.0Systematically remove malware, backdoors, and attacker persistence mechanisms from infected systems while ensuring complete eradication and preventing re-infection.
Detecting Wmi Persistence
v1.0.0Detect WMI event subscription persistence by analyzing Sysmon Event IDs 19, 20, and 21 for malicious EventFilter, EventConsumer, and FilterToConsumerBinding creation.
Detecting T1548 Abuse Elevation Control Mechanism
v1.0.0Detect abuse of elevation control mechanisms including UAC bypass, sudo exploitation, and setuid/setgid manipulation by monitoring registry modifications, process elevation flags, and unusual parent-child process relationships.