RedTeamGuides

RedTeamGuides

Home
Notes
Chat
Guides
Archive
Behavioral Intelligence (BEHINT)
A Technical Implementation of Video Intelligence Surveillance (VIDINT) for AI-powered analysis of video surveillance data
Aug 15, 2025 • Reza

July 2025

AI For OSINT: Texture Intelligence
The Pentagon leaks case of 2023 revealed something extraordinary: the most sophisticated security breach in recent history was solved not by advanced…
Jul 25, 2025 • Reza

January 2025

50 Methods For Lsass Dump
Mimikatz
Jan 26, 2025 • Reza
Large Language Model Prompts
LLM01:2023 - Prompt Injections
Jan 26, 2025 • Reza
Hacking Methods In Films
COD Ghost
Jan 26, 2025 • Reza
64 Methods For Execute Mimikatz
go-mimikatz
Jan 26, 2025 • Reza
Satellite Hacking Demystified
ADCS (Attitude Determination and Control System)
Jan 26, 2025 • Reza
Kevin Mitnick Lessons
Pretexting
Jan 26, 2025 • Reza
Top 50 Vulnerabilities Leading to RCE in Public-Facing Applications
Log4Shell Vulnerability in Log4j
Jan 26, 2025 • Reza
Top 60 Compression Methods
NTFS @echo off setlocal enabledelayedexpansion :: Compress the file or directory compact /c "path_to_file_or_directory" :: Slice the compressed file…
Jan 26, 2025 • Reza
Bash Tips and Tricks
Network Commands
Jan 26, 2025 • Reza
Abuse SVCHost Methods
svchost.exe, which stands for "Service Host", is an integral part of the Windows operating system.
Jan 26, 2025 • Reza
© 2026 RedTeamGuides · Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture