Use diverse techniques for initial access
Enumerate and persist on targets`
Evade security solutions
Exploit Active Directory
Windows Internals
Introduction to Windows API
Abusing Windows Internals
Introduction to Antivirus
AV Evasion: Shellcode
Obfuscation Principles
Signature Evasion
Bypassing UAC
Runtime Detection Evasion
Evading Logging and Monitoring
Living Off the Land
Network Security Solutions
Firewalls
Sandbox Evasion
Active Directory Basics
Breaching Active Directory
Enumerating Active Directory
Lateral Movement and Pivoting
Exploiting Active Directory
Persisting Active Directoryđźš§
Credentials Harvesting
Red Team Capstone Challenge