I wanted to share some useful links with you
If you have any cool resource, please share them here and I’ll add them to the list!
Cheatsheets
- Windows Red Team Cheat Sheet | Security Blog
- RedTeam_CheatSheet.ps1 · GitHub
- GitHub - OlivierLaflamme/Cheatsheet-God: Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
- GitHub - S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
- PayloadsAllTheThings/Active Directory Attack.md at master · swisskyrepo/PayloadsAllTheThings · GitHub
- Notion – The all-in-one workspace for your notes, tasks, wikis, and databases.
- arsenal/mindmap at master · Orange-Cyberdefense/arsenal · GitHub
- GitHub - S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
- GitHub - HarmJ0y/CheatSheets: Cheat sheets for various projects.
Articles
- Active Directory & Kerberos Abuse - Red Teaming Experiments
- eXploit – Delegate 2 Thyself
- Bypass AMSI by manual modification | S3cur3Th1sSh1t
- https://henpeebin.com/kevin/blog/comparing-windows-execution-methods.html
- Sailing Past Security Measures In AD – LuemmelSec – Just an admin on someone else´s computer
- Using Custom Covenant Listener Profiles & Grunt Templates to Elude AV - Offensive Defence
- Home - Coding towards chaotic good and blogging about it - harmj0y
- “Relaying” Kerberos - Having fun with unconstrained delegation - dirkjanm.io
- Top 16 Active Directory Vulnerabilities - InfosecMatter
Tools
- GitHub - rasta-mouse/ThreatCheck: Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.
- GitHub - CBHue/PyFuscation: Obfuscate powershell scripts by replacing Function names, Variables and Parameters.
- GitHub - phra/PEzor: Open-Source PE Packer
- https://amsi.fail/
- GitHub - Aetsu/OffensivePipeline: OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.
- GitHub - py7hagoras/CovenantTasks: Source for tasks I have used with Covenant
- GitHub - matterpreter/DefenderCheck: Identifies the bytes that Microsoft Defender flags on.
- GitHub - S3cur3Th1sSh1t/Invoke-SharpLoader
Home Lab
Misc
Edit 21/06/2021:
- Added links from the Unofficial eLearnSecurity Discord server.
- Modified the post structure for better readability
- Special credits to kknas and IceLord