#redteaming

Alameen KarimMerali :verified:brotheralameen@ioc.exchange
2026-02-23

Recently completed the #CAPT (#Certified #Associate #Penetration #Tester) Certification and received the #CWSE (#Certified #Web #Security #Expert) today.

Thanks a lot #Hackviser. This will help add up to the knowledge I have in my #cybersecurity #cybersec #ethicalhacking #redteaming #informationsecurity #infosec skills including the knowledge and skills gotten from my #networking #course from the #CompTIA CompTIA, Inc. #Network+ that I completed recently as well.

However, for me, University of the People is pretty much like a refresher because everything I expected from them has basically already been covered in courses I’ve already done. Haha!

2026-02-23

HackTheBox. Прохождение Falafel. Уровень — Сложный

Прохождение сложной Linux машины на платформе HackTheBox под названием Falafel . Предварительно нужно подключиться к площадке HackTheBox по VPN . Желательно использовать отдельную виртуальную машину. Учимся работать с готовыми эксплоитами и metasploit -ом. Разбираем SQLi (Boolean-based Blind), PHP Type Juggling Attack (Magic Hashes), Filename Truncation Attack to Upload a PHP Script.

habr.com/ru/articles/1002710/

#hackthebox #htb #redteam #redteaming #pentest #pentesting

2026-02-21

HackTheBox. Прохождение HackTheBox — Chatterbox. Уровень — Средний

Прохождение средней Windows машины на платформе HackTheBox под названием Chatterbox . Предварительно нужно подключиться к площадке HackTheBox по VPN . Желательно использовать отдельную виртуальную машину. Учимся работать с готовыми эксплоитами и metasploit -ом.

habr.com/ru/articles/1002286/

#hackthebox #htb #redteam #redteaming #pentest #pentesting

2026-02-19

HackTheBox. Прохождение CrimeStoppers. Уровень — Сложный

Прохождение сложной Linux машины на платформе HackTheBox под названием CrimeStoppers . Предварительно нужно подключиться к площадке HackTheBox по VPN . Желательно использоваться отдельную виртуальную машину. Реверсим приложение c помощью IDA PRO , потрошим Thunderbird, находим RCE на портале.

habr.com/ru/articles/1001618/

#hackthebox #htb #pentest #pentesting #redteam #redteaming

Mark Gadala-Maria (@markgadala)

PentAGI의 존재와 보안 전문가들이 이를 마치 크리스마스처럼 환영하는 현실을 우려하는 경고성 트윗. AI 기반 레드팀 도구의 '돌파구'가 자동화된 해킹과 보안 악용 가능성을 심화시킬 수 있다고 지적한다.

x.com/markgadala/status/202418

#pentagi #ai #redteaming #cybersecurity #security

2026-02-18
The Era of Autonomous AI Hackers is Here: Meet Shannon ⚡️

As a systems analyst, I'm always tracking where AppSec is heading. We’re moving away from static scanners toward autonomous agents that "think" like red-teamers.

Shannon is a prime example. It’s an AI agent by Keygraph that doesn't just flag "potential issues" — it finds and executes actual exploits without any human hints.

Why it’s impressive:

- 96.15% Success Rate: Achieved on the hint-free XBOW Benchmark (white-box mode).
- Behavioral Analysis: It maps data flows and builds attack hypotheses instead of just matching patterns.
- Proof-of-Exploit: If it reports a bug, it provides a reproducible PoC. No more wasting time on false positives.
- Modern Stack: Handles complex OAuth flows, 2FA, and can be integrated into CI/CD via Docker.

My Take: For those of us in DevOps/Self-hosting, this is a double-edged sword. While it’s a godsend for daily automated pentesting, it also means the "script kiddies" of tomorrow will be replaced by AI agents that don't sleep and scale infinitely.

Source: github.com/KeygraphHQ/shannon
Via: LinuxKalii

#Infosec #AppSec #AI #CyberSecurity #OpenSource #RedTeaming
2026-02-16

HackTheBox. Прохождение FluxCapacitor. Уровень — Средний

Прохождение средней Linux машины на платформе HackTheBox под названием FluxCapacitor . Предварительно нужно подключиться к площадке HackTheBox по VPN . Желательно использоваться отдельную виртуальную машину. Будет рассмотрен WAF и попытки его обойти.

habr.com/ru/articles/1000164/

#hackthebox #htb #pentest #pentesting #redteam #redteaming

2026-02-15

HackTheBox. Прохождение Bashed. Для новичков. Ультра-легкий

Прохождение одной из самой легкой машины на платформе HackTheBox под названием Bashed . Предварительно нужно подключиться к площадке HackTheBox по VPN . Желательно использоваться отдельную виртуальную машину.

habr.com/ru/articles/996722/

#hackthebox #htb #pentest #pentesting #redteam #redteaming

2026-02-10

This multi-part blog series is discussing an undocumented feature of Windows: instrumentation callbacks (ICs).

In part 4 we cover ICs from a more theoretical standpoint. Mainly restrictions on unsetting them, how set ICs can be detected and how new ones can be prevented from being set.

Learn more at cirosec.de/en/news/windows-ins

#Blog #Windows #Shellcode #RedTeaming #ReverseEngineering

This multi-part blog series is discussing an undocumented feature of Windows: instrumentation callbacks (ICs).

In part 4 we cover ICs from a more theoretical standpoint. Mainly restrictions on unsetting them, how set ICs can be detected and how new ones can be prevented from being set.
2026-02-04

So, one of my resolutions this year was to write more code.
I love to break stuff, but last year I reignited my passion for coding and I would really love to contribute to the community that has given me so much and continues to do so.
And contributing works a lot better by creating, rather than breaking.

So I created a codeberg account. And I already have a first repo published!
I called it Axmar.
Axmar is a C# implementation of the SilentHarvest technique that was published last year.
It uses backup access and rarely used APIs to (mostly) stealthily read the local credentials database in Windows system.

Enjoy!

codeberg.org/Ti-Kallisti/Axmar

#foss #coding #infosec #malware #pentesting #redteaming #codeberg #windows #csharp

2026-02-01

RE: mastodon.social/@XC3LL/1159905

Very valuable insight if you are into #redteaming

Kevin Karhan :verified:kkarhan@infosec.space
2026-01-30

@BrideOfLinux THIS is why one has explicit comms prepared to get released immediately.

#RedTeam #RedTeaming #Pentesting #PhysicalSecurity #Itsec #InfoSec #OpSec #ComSec

2026-01-19

What ticketing system do Red Teamers generally perfer? How about for knowledge management?

#redteam #redteaming

Anthropic (@AnthropicAI)

총 1,700시간의 누적 레드팀(공격/보안 테스트) 결과, 새 시스템에 대해 여러 쿼리에서 일관되게 통하는 '범용 재킹'(universal jailbreak)을 아직 발견하지 못했다는 연구 결과 및 논문을 알리는 트윗입니다. 보안·강인성 관점의 평가와 관련된 리포트 공개를 안내합니다.

x.com/AnthropicAI/status/20097

#redteaming #security #ai #jailbreak

2025-12-03

Neue HiWay-Podcast-Folge: „Auf leisen Sohlen – Wie Red-Teaming Menschen und Prozesse im Ernstfall herausfordert und prüft.“ youtu.be/wz6sGs5VzCM Security
Consultant Marcel Heisel erzählt uns, wie Red-Teaming Unternehmen auf Herz und Nieren prüft – von unbemerkten Netzwerkzugängen bis hin zu physischen Schlupflöchern. Moderation: Lena Morgenroth

YouTube: youtu.be/wz6sGs5VzCM
Spotify: open.spotify.com/show/6FwPurxO
Apple: podcasts.apple.com/us/podcast/

Moderierte Expertentalks zu Themen, Trends & Herausforderungen aus
✔️ IT-Sicherheit
✔️ Digitale Transformation
✔️ Business Continuity & Krisenmanagement
✔️ IT-Management
✔️ Regulatorik, Compliance & Governance

Die nächste HiWay-Folge erscheint am 17. Dezember.

#Digitalisierung #ITSicherheit #HiSolutions #HiWay #CyberSecurity #Ransomware #Prävention #Resilienz #RedTeaming #EthicalHacking #ITSecurity #SocialEngineering #Phishing

2025-11-30

Một nhà phát triển đã tạo công cụ triển khai AI tự host trên AWS (dùng Ollama/Open WebUI) và đang tìm kiếm các mô hình AI "không kiểm duyệt", giỏi lập trình để thử nghiệm cho Red Teaming/pentesting an ninh mạng. Bạn có gợi ý nào không?

#AI #AWS #Ollama #SelfHosted #Cybersecurity #RedTeaming #Pentesting #TechNews
#TríTuệNhânTạo #AnNinhMạng #PhátTriểnPhầnMềm #CôngNghệ

reddit.com/r/ollama/comments/1

2025-11-25

"Tạo công cụ kiểm thử AI Red Teaming cục bộ với Fuzzer và 280 Payloads để tránh đăng ký hàng tháng. Công cụ này bao gồm Mutation Fuzzer, Payloads thực tế và AI Judge. #AITools #RedTeaming #Fuzzer #AI #AnToànBảoMật #CôngCụKiểmThử"

reddit.com/r/LocalLLaMA/commen

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst