$id
"Man is more complex than any of his machines." ~ Samuel B. Griffith II
$cat /root/important.txt
This are publicly accessible notes about my red teaming and penetration testing experiments which I have learned or developed in a controlled environment that involve playing with various tools and techniques used by penetration testers, red teamers and actual adversaries.
Do not take copy or publish anything from this blogs without permission
Do not expect the notes to be reliable in every case scenarios
If you found any mistake or suggestion. Please contact me on twitter @wr3nch0x1
Have a nice read
Most of these techniques are discovered by other security researchers and I do not claim their ownership. I try to reference the sources whenever possible, but if you think I've missed something, please let me know.
$ whoami
Akshay Jain - Hacker since 2016
Known as wr3nch0x1
https://www.linkedin.com/wr3nch0x1
https://www.x.com/wr3nch0x1
Experienced with Red Team Labs such as Windows Red Team Lab, RastaLabs, Offshore etc
$ cat Goals
Field Manual
0x0 Recon
0x1 Code Injection
0x2 Payload Evasion
0x3 Thick Client Security Testing
0x3 AD Recon
0x4 Audit
0x5 Post Exploitation
0x6 Password Cracking
0x7 Misc
Reviews
Last updated