RedTeamGuides

RedTeamGuides

Home
Notes
Chat
Guides
Archive
Behavioral Intelligence (BEHINT)
A Technical Implementation of Video Intelligence Surveillance (VIDINT) for AI-powered analysis of video surveillance data
Aug 15 • 
Reza
3

July 2025

AI For OSINT: Texture Intelligence
The Pentagon leaks case of 2023 revealed something extraordinary: the most sophisticated security breach in recent history was solved not by advanced…
Jul 25 • 
Reza

January 2025

50 Methods For Lsass Dump
Mimikatz
Jan 26 • 
Reza
Large Language Model Prompts
LLM01:2023 - Prompt Injections
Jan 26 • 
Reza
Hacking Methods In Films
COD Ghost
Jan 26 • 
Reza
64 Methods For Execute Mimikatz
go-mimikatz
Jan 26 • 
Reza
Satellite Hacking Demystified
ADCS (Attitude Determination and Control System)
Jan 26 • 
Reza
Kevin Mitnick Lessons
Pretexting
Jan 26 • 
Reza
Top 50 Vulnerabilities Leading to RCE in Public-Facing Applications
Log4Shell Vulnerability in Log4j
Jan 26 • 
Reza
Top 60 Compression Methods
NTFS @echo off setlocal enabledelayedexpansion :: Compress the file or directory compact /c "path_to_file_or_directory" :: Slice the compressed file…
Jan 26 • 
Reza
Bash Tips and Tricks
Network Commands
Jan 26 • 
Reza
Abuse SVCHost Methods
svchost.exe, which stands for "Service Host", is an integral part of the Windows operating system.
Jan 26 • 
Reza
© 2025 RedTeamGuides
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture