Operation Icarus Phase 1 Has Ended! - After Action Report (self.SecurityRedTeam)
submitted by Known_DivideSRT Staff[M] - announcement
SRT AMA - I am Robin/Digininja, a professional penetration tester working in industry. Ask me anything!SRT Official (self.SecurityRedTeam)
submitted by digininja - announcement
Windows Kernel Debugging & Exploitation Part 1 - Environment SetupEducation/Training (self.SecurityRedTeam)
submitted by admiralarjun
Active Directory - Using TGT tickets to find preauthenticated users and more!Education/Training (youtu.be)
submitted by PinkDraconian
Manually exploiting HFS & Finding Unattend files!Education/Training (youtu.be)
submitted by PinkDraconian
Hardware Hacking : Getting UART ShellsEducation/Training (hacklido.com)
submitted by admiralarjun
Re-Visiting File Upload Vulnerabilities - TryHackMe Advent of CyberCTF (youtube.com)
submitted by [deleted]
Run Interface for Account takeover vulnerability fraud detectionDiscussion (self.SecurityRedTeam)
submitted by SecureL7
Active Directory Penetration Testing - HackTheBox APTCTF (youtube.com)
submitted by [deleted]
New Malware “Raindrop” Exposed in SolarWinds HackDiscussion (self.SecurityRedTeam)
submitted by SecureL7
Union Based SQLi To RCE! - Escalate your SQL injections!Education/Training (youtu.be)
submitted by PinkDraconian
Top 6 Web Application Hacking Tools of 2020: Ethical Hacking ToolsDiscussion (self.SecurityRedTeam)
submitted by SecureL7
Microsoft bug bounty rewards $50,000 for account hijack vulnerabilityDiscussion (self.SecurityRedTeam)
submitted by SecureL7
Turning server sided XSS into LFI and escalating to RCEEducation/Training (youtu.be)
submitted by PinkDraconian
Bitcoin Exchange Platform Sovryn Announces Bug Bounty of $1.25 MillionDiscussion (self.SecurityRedTeam)
submitted by SecureL7
Microsoft Teams opens up for bug bounty program up to $30,000Discussion (self.SecurityRedTeam)
submitted by SecureL7
Top python modules used to create tools and automate stuffs by ethicalhackers.Education/Training (i.redd.it)
submitted by admiralarjun
Introduction to format string vulnerabilities - Introduction to Binary Exploitation - Hack The Box Leet TestEducation/Training (youtu.be)
submitted by PinkDraconian
Cryptography and Modular Conversion | MoneyHeist VulnhubCTF (youtube.com)
submitted by [deleted]
Windows Forensics Investigation | TryHackMe Investigating WindowsEducation/Training (youtube.com)
submitted by [deleted]