0x0vidSetting Up Simple Red Team InfrastructureTL;DR: Getting stuff set up properly is quite niceDec 16, 2024Dec 16, 2024
Sam RothlisbergerPDF Shortcut File with SSH Executed Dynamic Reverse SOCKS Proxy and Password File StealerDISCLAIMER: Using these tools and methods against hosts that you do not have explicit permission to test is illegal. You are responsible…May 3, 20242May 3, 20242
InFMI Cyber Security Consulting ServicesbyRio DarmawanRed Teaming — Install C2(Havoc) framework & Setting up C2 Redirectors on Azurehello everyone, this is my second post in the red team series. in the previous article I discussed the installation of bloodhound community…Sep 27, 2024Sep 27, 2024
Dmitrijs TriznaDesign and setup of C2 traffic redirectorsThis article describes the Command & Control (C2) infrastructure design and provides a step-by-step setup of the C2 redirector.Jan 2, 2021Jan 2, 2021
0x0vidHow to Build Your Own Custom C2 FrameworkObligatory disclaimer: All of the information presented here is for research purposes and should only be used in a legitimate and legal…Mar 28, 20241Mar 28, 20241
0x0vidCreating a DNS C2 server and agentTL;DR — C2 communication over DNS can be simplified to a couple of DNS records and an internet-exposed server listening on port 53Sep 2, 20242Sep 2, 20242
Corey JonesWanna Build a (RAT) Remote Access Trojan?? Part 3After building the Trojan i thought wouldn’t it be a cool idea to add a Node server that would control the Trojan remotely.So that’s what i…Aug 15, 20241Aug 15, 20241
Corey JonesWanna build a (RAT) Remote Access Trojan?? Part 2Building our TrojanAug 10, 20243Aug 10, 20243