Creating Information Security Blog focused on Red Teaming Techniques

Select a membership level


per month

You are plain awesome for supporting!




The started with a couple of goals in mind:
  • learn attacking techniques used by red teams and real adversaries by executing them in a lab environment
  • write code to further the understanding of some of the said techniques
  • monitor what most common artifacts the techniques leave behind on compromised systems
  • document everything and make work as a reference for the future for myself and anyone else

Recent posts by

How it works

Get started in 2 minutes

Choose a membership
Sign up
Add a payment method
Get benefits