Cyber Attack & Defense
4.03K subscribers
4:19
Windows Defender Got You Down? Try No-Defender!
Cyber Attack & Defense
949 views • 2 weeks ago
11:32
LSASS Dumping Using DFIR Tools
Cyber Attack & Defense
1.3K views • 1 month ago
8:39
Group Policy Preferences Exploitation And Defense
Cyber Attack & Defense
458 views • 1 month ago
19:45
Deceptive Cyber Tactics: Deceiving Responder
Cyber Attack & Defense
460 views • 1 month ago
14:41
VBA Is Dead Long Live VBA
Cyber Attack & Defense
815 views • 3 months ago
19:57
Sql Server Hacking: Master The Basics!
Cyber Attack & Defense
821 views • 4 months ago
9:02
Kerberoasting: The Art Of Cyber Deception
Cyber Attack & Defense
569 views • 6 months ago
22:22
Certipy and ADCSync attacks against Active Directory Certificate Services
Cyber Attack & Defense
2.1K views • 7 months ago
4:20
Microsoft Dev Tunnels for C2, Persistance and RDP Redirection
Cyber Attack & Defense
1.5K views • 8 months ago
8:00
Red Team Tips: How To Use Powershell Kerberos For Kerberos Abuse
Cyber Attack & Defense
1.5K views • 10 months ago
2:31
RedTeam Tips: Exploiting Cisco Anyconnect CVE-2023-20178
Cyber Attack & Defense
1.8K views • 11 months ago
29:08
Stolen Signed Drivers: The Privilege Escalation Threat You Need To Know About.
Cyber Attack & Defense
671 views • 11 months ago
5:07
Red Team Tips: May 5th 2023 AMSI Killer AMSI Patch
Cyber Attack & Defense
1.1K views • 1 year ago
24:25
Abusing IT Management Tools to Create C2
Cyber Attack & Defense
965 views • 1 year ago
10:17
Exploiting Outlook CVE-2023-23397 to Relay Credentials
Cyber Attack & Defense
3K views • 1 year ago
10:21
Red Team Tips: Kerberos Diamond Ticket
Cyber Attack & Defense
1.3K views • 1 year ago
3:28
Red Team Tips: Amsi Patch to Bypass Windows Defender
Cyber Attack & Defense
2.1K views • 1 year ago
14:59
Red Team Tips: SSH Tunneling Shenanigans
Cyber Attack & Defense
1K views • 1 year ago
16:34
Red Team Tips: Updated PaloAlto XDR Bypass
Cyber Attack & Defense
4.7K views • 1 year ago
6:24
Red Team Tips February 1st: OPSEC Safe Active Directory Enumeration with SilentHound
Cyber Attack & Defense
1.3K views • 1 year ago
23:27
Multi-Factor Authentication Phishing Setup Part 3: EvilGoPhish Setup
Cyber Attack & Defense
11K views • 1 year ago
4:38
Red Team Tips January 16th (Dumping LSASS the Kamikaze way)
Cyber Attack & Defense
1.8K views • 1 year ago
9:46
Multi-Factor Authentication Phishing Setup Part 2: Domain Authentication
Cyber Attack & Defense
3.1K views • 1 year ago
11:29
Multi-Factor Authentication Phishing Setup Part 1: Picking an Effective Domain
Cyber Attack & Defense
4.2K views • 1 year ago
2:40
Red Team Tips January 1st 2023 (New AMSI Bypass)
Cyber Attack & Defense
2.4K views • 1 year ago
13:31
Catching Mark of the Web Bypass
Cyber Attack & Defense
468 views • 1 year ago
12:51
Getting Executables into Memory (Going Fileless)
Cyber Attack & Defense
2.2K views • 1 year ago
20:06
Writing Ransomware for VMware ESXi
Cyber Attack & Defense
1K views • 1 year ago
7:43
SpearPhishing a User with Multifactor Authentication Enabled
Cyber Attack & Defense
6.7K views • 1 year ago
22:47
Finding the Sliver Lining
Cyber Attack & Defense
3.8K views • 1 year ago
Load More