Page cover image

$id

"Man is more complex than any of his machines." ~ Samuel B. Griffith II

$cat /root/important.txt

This are publicly accessible notes about my red teaming and penetration testing experiments which I have learned or developed in a controlled environment that involve playing with various tools and techniques used by penetration testers, red teamers and actual adversaries.

  • Do not take copy or publish anything from this blogs without permission

  • Do not expect the notes to be reliable in every case scenarios

  • If you found any mistake or suggestion. Please contact me on twitter @wr3nch0x1

  • Have a nice read

Most of these techniques are discovered by other security researchers and I do not claim their ownership. I try to reference the sources whenever possible, but if you think I've missed something, please let me know.

$ whoami

  • Akshay Jain - Hacker since 2016

  • Known as wr3nch0x1

  • https://www.linkedin.com/wr3nch0x1

  • https://www.x.com/wr3nch0x1

  • Experienced with Red Team Labs such as Windows Red Team Lab, RastaLabs, Offshore etc

$ cat Goals

  • Field Manual

  • 0x0 Recon

  • 0x1 Code Injection

  • 0x2 Payload Evasion

  • 0x3 Thick Client Security Testing

  • 0x3 AD Recon

  • 0x4 Audit

  • 0x5 Post Exploitation

  • 0x6 Password Cracking

  • 0x7 Misc

  • Reviews

Last updated