My LinkedIn: https://www.linkedin.com/in/joas-antonio-dos-santos/
Download Lab Dev: https://mega.nz/file/LB1HTQQL#UQ9dKCj55NO1up-iJxfUqGXpV7uJlSMuONhdr6Z8NBo
Red Team Exercises #0 - Red Team Dev Machine Download https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamdev-redteamexercises-activity-7264053830919614465--0xL?utm_source=share&utm_medium=member_desktop
Red Team Exercise #1 - How to improve my shellcode runner https://www.linkedin.com/posts/joas-antonio-dos-santos_hacking-redteam-cybersecurity-activity-7187108451313983489-X0uc?utm_source=share&utm_medium=member_desktop
Red Team Exercises #2 - What can't be missing from your nginx redirectors? https://www.linkedin.com/posts/joas-antonio-dos-santos_hacking-redteam-cybersecurity-activity-7187864603651952640-vR8f?utm_source=share&utm_medium=member_desktop
Red Team Exercises #3 - AMSI Bypass https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-cybersecurity-amsibypass-activity-7191807240637472769-XoHb?utm_source=share&utm_medium=member_desktop
Red Team Exercises #4 - Domain Controller Owned PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_hacking-redteam-cybersecurity-activity-7192621508408594432-62X1?utm_source=share&utm_medium=member_desktop
Red Team Exercises #5 - Spear-Phishing Campaign 1 https://www.linkedin.com/posts/joas-antonio-dos-santos_hacking-redteam-cybersecurity-activity-7193434385600147457-7qzf?utm_source=share&utm_medium=member_desktop
Red Team Exercises #6- ETW Evasion https://www.linkedin.com/posts/joas-antonio-dos-santos_hacking-redteam-cybersecurity-activity-7196117085263904769-sjH6?utm_source=share&utm_medium=member_desktop
Red Team Exercises #7 - PPL Bypass https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-cybersecurity-pplevasion-activity-7201681520439296001-pd-g?utm_source=share&utm_medium=member_desktop
Red Team Exercises #8 - SmartScreen Bypass https://www.linkedin.com/posts/joas-antonio-dos-santos_hacking-redteam-cybersecurity-activity-7204821933102739456-xpld?utm_source=share&utm_medium=member_desktop
Red Team Exercises #9 - Process Injection https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-cybersecurity-informationsecurity-activity-7207721019216769025-nSUL?utm_source=share&utm_medium=member_desktop
Red Team Exercises #10 - Spear-Phishing PT.2 https://www.linkedin.com/posts/joas-antonio-dos-santos_hacking-redteam-cybersecurity-activity-7208825346891124736-Jzz4?utm_source=share&utm_medium=member_desktop
Red Team Exercises #11 - Physical Operations PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-hacking-redteam-activity-7211889402178916353-yRsn?utm_source=share&utm_medium=member_desktop
Red Team Exercises #12 - AntiVM/Sandbox Evasion https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7214304403904724992-9wKd?utm_source=share&utm_medium=member_desktop
Red Team Exercises #13 - Windows API Hooking and DLL Injection https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-cybersecurity-activity-7216952225355464704-NSRp?utm_source=share&utm_medium=member_desktop
Red Team Exercises #14 - Direct and Indirect Syscall PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-cybersecurity-syscall-activity-7218437410651594752-h9K5?utm_source=share&utm_medium=member_desktop
Red Team Exercises #15 - Direct Syscall Lsass Dump https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-informationsecurity-activity-7220958774251913216-aOYp?utm_source=share&utm_medium=member_desktop
Red Team Exercises #16 - BYOVD Technique PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-byovd-activity-7222089315663642625-yPSU?utm_source=share&utm_medium=member_desktop
Red Team Exercises #17 - Active Directory Enumeration PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7225871406910103552-5bjN?utm_source=share&utm_medium=member_desktop
Red Team Exercises #18 - C2 Redirector PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-cybersecurity-activity-7227644801649676288-uYB7?utm_source=share&utm_medium=member_desktop
Red Team Exercises #19 - Alternative, Custom or Undocumented Implementations of Windows API PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteamoperations-defenseevasion-activity-7229563862759403520-h9_7?utm_source=share&utm_medium=member_desktop
Red Team Exercises #20 - EDR Evasion using Hookchain Technique Created by Hélvio Júnior, SCMPA e SCWAP Leader, OSCE3, OSCP, eCXD https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7230653751382994944-qZs9?utm_source=share&utm_medium=member_desktop
Red Team Exercises #21 - Havoc C2 Profile https://www.linkedin.com/posts/joas-antonio-dos-santos_cyberecurity-redteamexercises-redteam-activity-7236704509563985920-EpJ4?utm_source=share&utm_medium=member_desktop
Red Team Exercises #22 - MutationGate Technique EDR Evasion by Ziyi Shen https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-cybersecurity-activity-7239467211545886720-JdxV?utm_source=share&utm_medium=member_desktop
Red Team Exercises #23 - Windows API Hashing https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-cybersecurity-activity-7243227509549371392-curr?utm_source=share&utm_medium=member_desktop
Red Team Exercises #24 - Powershell Unmanaged or Powershell w/o Powershell https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-cybersecurity-activity-7245123542587981824-fwZT?utm_source=share&utm_medium=member_desktop
Red Team Exercises #25 - UnhookingPatch by Saad AHLA https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-cybersecurity-redteamexercises-activity-7246214606099009536-eVrM?utm_source=share&utm_medium=member_desktop
Red Team Exercises #26 - Syswhisper3 - (in)Direct Syscall Tool https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-syscalls-ugcPost-7247988959685873666-W0pQ?utm_source=share&utm_medium=member_desktop
Red Team Exercises #27 - Syscall Hook Detector https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7249584951036133376-dc8t?utm_source=share&utm_medium=member_desktop
Red Team Exercises #28 - Mimikatz Cheatsheet Basic https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-cybersecurity-activity-7253180441560530945-wTeF?utm_source=share&utm_medium=member_desktop
Red Team Exercises #29 - HTML Smuggling Delivery https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7255911100032995328-q-W8?utm_source=share&utm_medium=member_desktop
Red Team Exercises #30 - Creating a simple Dropper in C++ PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-cybersecurity-activity-7258880173310132224-o_NG?utm_source=share&utm_medium=member_desktop
Red Team Exercises #31 - Movfuscator (A fun way to obfuscate, but perhaps not effective these days) https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7262037200475721731-McHq?utm_source=share&utm_medium=member_desktop
Red Team Exercises #32 - Donut Shellcode Generator PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_redteam-redteamexercises-cybersecurity-activity-7264846631399776256-nV6Q?utm_source=share&utm_medium=member_desktop
Red Team Exercises #33 - Shellcode Runner with Kill Switch / Panic Switch https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7268790211692670977-kFeT?utm_source=share&utm_medium=member_desktop
Red Team Exercises #34 - Remote Thread Hijacking https://www.linkedin.com/posts/joas-antonio-dos-santos_redteamexercises-redteam-cybersecurity-activity-7271003348558860288-M8tu?utm_source=share&utm_medium=member_desktop
OSINT for Red Team Exercises - #1 Dorks Search using sitedorks Tool https://www.linkedin.com/posts/joas-antonio-dos-santos_cybersecurity-redteamexercises-osintexercises-activity-7253736729285672961-SKDq?utm_source=share&utm_medium=member_desktop
OSINT for Red Team Exercises #2 - Credential Leaks: Exploring Targets with Compromised Data Intelligence PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_cybersecurity-osint-osintforredteam-activity-7257723022843781120-Otii?utm_source=share&utm_medium=member_desktop
OSINT for Red Team Exercises #3 - Whois and Resolving Domains https://www.linkedin.com/posts/joas-antonio-dos-santos_osintexercises-redteam-cybersecurity-activity-7265813615121727491-PKos?utm_source=share&utm_medium=member_desktop
OSINT for Red Team Exercises #4 - Deep/Dark Web Search PT.1 https://www.linkedin.com/posts/joas-antonio-dos-santos_osint-redteam-cybersecurity-activity-7275701771451199488-uIxe?utm_source=share&utm_medium=member_desktop