RedTeam Recipes

Home

About

contact

services

hall of fame

questions

trusted partners

privacy policy

user avatar

RedTeam Recipes

The only cookbook where Evasion are on the menu
Cairo, Egypt
loading..
HardwareNetwork

The small form factor MITM - Network TAP

By Mo’men El-Rashidi TAPPERThe idea was to create a small formfactor MITM - Network TAP that combined with Wireshark and some proper optional Plugins, can go on undetected on any network, whether it’s a switch to switch, router to switch, or intermediary actor between PC’s.Which doesn’t consume power - Completely passive -, is Plug n’ Play,comes in handy f..

Read more
loading..
Real WorldZKTecoBioTime

From BioTime To System

By Fady Moheb What is BioTime ? BioTime is a powerful time and attendance management software that provides a stable connection with up to thousands of ZKTeco’s standalone push communication devices through Ethernet/ WIFI/ 3G/ 4G and works as a private cloud to offer employee self-service by mobile application and web browser.As we see BioT..

Read more
loading..
Real WorldZero DayCVE

Zero Glow

By Fady Moheb What is Glowroot ?Glowroot is an open-source Application Performance Monitoring (APM) tool for Java applications. It runs as a lightweight Java agent and collects detailed data about transactions, JVM performance, SQL queries and errors, usually with very low overhead in production environments. It is mainly used to monitor the performance an..

Read more
loading..
NetworkWindowsEvasion

Windows Defense Evasion Guide

By Fady Moheb Antimalware Scan Interface [ AMSI ]Antimalware Scan Interface [ AMSI ] is. Microsoft developed it to provide a set of API calls for applications, including any third-party applications, to perform a signature-based scan of the content. Windows Defender uses it to scan PowerShell scripts, .NET, VBA macros, Windows Script Host (WSH), VBScript, ..

Read more
loading..
Exploit DevelopmentMacOS

macOS Shellcoding in depth on x86_6

By Zeyad Azima IntroductionThis guide explores shellcoding on the x86_64 architecture for macOS, bypassing the traditional x86 starting point for a practical reason: with the release of macOS 10.15 (Catalina), Apple discontinued support for 32-bit applications entirely. Since x86_64 maintains backward compatibility with x86 code anyway, focusing on 64-bit ..

Read more
loading..
Exploit DevelopmentExploit Developmentzero daycve

We are ARMed no more ROPpery Here

By Zeyad Azima IntroductionIn 2017, ARM introduced Pointer Authentication (PAC) as part of its ARMv8.3-A architecture updates. This groundbreaking solution aimed to tackle one of the most critical challenges in software security: memory corruption vulnerabilities. By leveraging cryptographic techniques, PAC made it significantly harder for attackers to tam..

Read more
123