RedTeamGuides
Subscribe
Sign in
Home
Notes
Chat
Guides
Archive
Latest
Top
Discussions
Behavioral Intelligence (BEHINT)
A Technical Implementation of Video Intelligence Surveillance (VIDINT) for AI-powered analysis of video surveillance data
Aug 15
•
Reza
3
July 2025
AI For OSINT: Texture Intelligence
The Pentagon leaks case of 2023 revealed something extraordinary: the most sophisticated security breach in recent history was solved not by advanced…
Jul 25
•
Reza
January 2025
50 Methods For Lsass Dump
Mimikatz
Jan 26
•
Reza
Large Language Model Prompts
LLM01:2023 - Prompt Injections
Jan 26
•
Reza
Hacking Methods In Films
COD Ghost
Jan 26
•
Reza
64 Methods For Execute Mimikatz
go-mimikatz
Jan 26
•
Reza
Satellite Hacking Demystified
ADCS (Attitude Determination and Control System)
Jan 26
•
Reza
Kevin Mitnick Lessons
Pretexting
Jan 26
•
Reza
Top 50 Vulnerabilities Leading to RCE in Public-Facing Applications
Log4Shell Vulnerability in Log4j
Jan 26
•
Reza
Top 60 Compression Methods
NTFS @echo off setlocal enabledelayedexpansion :: Compress the file or directory compact /c "path_to_file_or_directory" :: Slice the compressed file…
Jan 26
•
Reza
Bash Tips and Tricks
Network Commands
Jan 26
•
Reza
Abuse SVCHost Methods
svchost.exe, which stands for "Service Host", is an integral part of the Windows operating system.
Jan 26
•
Reza
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts