This is my way of learning things - by doing, following, tinkering, exploring, repeating and taking notes.
At ired.team, I will explore some of the common offensive security techniques involving gaining code execution, code injection, defense evasion, lateral movement, persistence and more.
Most of these techniques are discovered by other security researchers and I do not claim their ownership. I try to reference the sources I use the best I can, but if you think I've missed something, please get in touch and I will fix it immediately.
Do not take everything or anything in these notes for granted.
Do not expect the notes to be exhaustive or covering the techniques or the artifacts they produce in full.
Expect mistakes in the notes.
Always consult additional resources.
ired.team Red Teaming Experiments GitBook is created by @spotheplanet.
Cloning it and presenting it as your own is illegal and strictly forbidden, don't do it.
Support and Donations
If you appreciate ired.team and would like to show support, you can do it via my: