RedCloud OS: A Comprehensive Overview
RedCloud OS: A Comprehensive Overview RedCloud OS, the latest innovation by CW Labs Pvt. Ltd., is a Debian-derived operating system designed for […]
Decoding the Mastery of Cyber Defense: Navigating a Metasploit C2 Incident through Comprehensive Illustrations
Decoding the Mastery of Cyber Defense: Navigating a Metasploit C2 Incident through Comprehensive Illustrations OVERVIEW As we are aware that the evolution […]
Exploring Ticket Injection in Rubeus
Exploring Ticket Injection in Rubeus When it comes to the AD related operations two famous tools that I can’t possibly overlook are […]
The Anatomy of QR Code Phishing: A Tactic So Powerful, it’s Like a Sith Lord in Your Pocket
The Anatomy of QR Code Phishing: A Tactic So Powerful, it’s Like a Sith Lord in Your Pocket INTRODUCTION TO QR CODES […]
A Comprehensive Learning Journey Through the Art of Effective Purple Teaming
A Comprehensive Learning Journey Through the Art of Effective Purple Teaming Overview As we are aware that the Purple teaming is a […]
A Unified Purple Teaming Approach on WINRM investigation and detection
A Unified Purple Teaming Approach on WINRM Investigation and Detection OVERVIEW In this blog we will be discussing the unified Purple Teaming […]
The Final Curtain for Process Doppelganging: Unmasking the Defender
The Final Curtain for Process Doppelganging: Unmasking the Defender Introduction Note: This blog does not delve deeply into this technique. However, if […]
Breaking Boundaries: CAs & Trust Between Forests
Breaking Boundaries: CAs & Trust Between Forests Hi folks, our team at CyberWarFare Labs has been working on building cutting-edge Pentesting / […]
Unlocking Success in Cyber Security: The Red Team Cyber Security Certifications Path
Join us on this thrilling journey and discover how you can become a Red Team specialist in the world of cyber security.
Bypassing AV/EDR Hooks via Vectored Syscall – POC
Bypassing AV/EDR Hooks via Vectored Syscall – POC Vectored Syscall It’s common to unhook any AV/EDRs hook in order to bypass them. […]
Google WorkSpace Directory Dump Tool
Google WorkSpace Directory Dump Tool Google Workspace Directory Extraction Tool : During a Cloud Red Team Project, as our last objective we […]
Kernel Exploitation Series – 001 – Exploiting Asus Aura Sync (1.07.71) & Bypassing SMEP & KASLR
Kernel Exploitation Series – 001 – Exploiting Asus Aura Sync (1.07.71) & Bypassing SMEP & KASLR CVE-2019-17603: Asus Aura Sync Introduction Asus […]