Red Teaming

Cloakify-Factory: A Data Exfiltration Tool Uses Text-Based Steganography

Data Exfiltration using PowerShell Empire

Get Meterpreter Session Alert over slack

Covert Channel: The Hidden Network

Command & Control: Ares

Command & Control: WebDav C2

Command & Control: WebSocket C2

Command and Control with DropboxC2

dnscat2: Command and Control over the DNS

Command & Control: Silenttrinity Post-Exploitation Agent

Command & Control Tool: Pupy

Command and Control Guide to Merlin

nps_payload: An Application Whitelisting Bypass Tool

GreatSct – An Application Whitelist Bypass Tool

Command and Control with HTTP Shell using JSRat

Koadic – COM Command & Control Framework

TrevorC2 – Command and Control

Generate Metasploit Payload with Ps1encode

Bypass Application Whitelisting using Weak Path Rule

Bypass Application Whitelisting using cmstp

Bypass Application Whitelisting using rundll32.exe (Multiple Methods)

Bypass Application Whitelisting using regsrv32.exe (Multiple Methods)

Bypass Application Whitelisting using wmic.exe (Multiple Methods)

Bypass Application Whitelisting using msbuild.exe (Multiple Methods)

Bypass Application Whitelisting using mshta.exe (Multiple Methods)

Bypass Application Whitelisting using msiexec.exe (Multiple Methods)

Windows Applocker Policy – A Beginner’s Guide

Penetration Testing on Group Policy Preferences

Comprehensive Guide on MSFPC

Multiple Ways to Exploiting Windows PC using PowerShell Empire

Empire GUI: Graphical Interface to the Empire Post-Exploitation Framework

OSX Exploitation with Powershell Empire

Windows Persistence with PowerShell Empire

Multiple Ways to Exploiting OSX using PowerShell Empire

Hiding IP During Pentest using PowerShell Empire (http_hop)

Hacking with Empire – PowerShell Post-Exploitation Agent