Logo
latest

In

  • Introduction
    • What?
    • Why?
    • How?
  • Creating malware
    • Attack tree
    • Cheatsheets
  • Windows malware
    • Attack tree
    • Notes
      • Veil
      • FatRat
    • Tools
    • Resources
  • Keylogger
    • Attack tree
    • Notes
    • Tools
  • Password recovery tool
    • Attack tree
    • Notes
    • Tools
  • Modifying code to bypass AV
    • Attack tree
    • Notes
    • Examples
      • Customise payload code using templates
    • Tools
    • Developments
  • Simple Windows trojan
    • Attack tree
    • Notes
      • Spoofing file extensions on Windows
    • Tools
  • macOS malware
    • Attack tree
    • Resources
  • Simple macOS trojan
    • Attack tree
    • Notes
      • Preview document icons
    • Tools
  • Linux malware
    • Attack tree
    • Notes
      • Bash backdoor
      • ZLogger
    • LazaGne
    • Execute & Report
    • Tools
    • Resources
  • Simple Linux trojan
    • Attack tree
    • Notes
      • Packaging
      • Creating An Android Trojan
    • Tools
  • Run payload on target device
    • Attack tree

Through

  • Introduction
    • What?
    • Why?
    • How?
  • Upgrade basic shell access to meterpreter/empire access
    • Attack tree
    • Notes
    • Cheatsheets
  • Maintaining access on Windows
    • Attack tree
    • Notes
      • Problems
    • Resources
  • Upload and execute using empire
    • Attack tree
    • Notes
  • Backdoor a Windows system process with empire
    • Attack tree
    • Notes
  • Privilege escalation on Windows
    • Attack tree
    • Notes
    • Cheatsheets
  • Maintaining access on macOS
    • Attack tree
    • Notes
    • Resources
  • Privilege escalation on macOS
    • Attack tree
    • Notes
      • Types
      • Existing exploits
      • The above method
    • Tools
    • Resources
  • Privilege escalation on Linux
    • Attack tree
    • Notes
      • Kernel exploits
      • Sudo exploits
      • SUID exploits
      • Capabilities exploits
    • Tools
    • Resources
  • Pivoting using meterpreter autoroute
    • Attack tree
Grove
  • Grove
  • Red Team
  • Improbability Blog
  • About the UU
  • Register

Grove

To start off in the red team as someone without hacking experience, we recommend following a story of a small grove in the forest. By following the plots in each section, you can get an impression of the grove, and by extension, of the forest.


In

  • Introduction
  • Creating malware
  • Windows malware
  • Keylogger
  • Password recovery tool
  • Modifying code to bypass AV
  • Simple Windows trojan
  • macOS malware
  • Simple macOS trojan
  • Linux malware
  • Simple Linux trojan
  • Run payload on target device

Through

  • Introduction
  • Upgrade basic shell access to meterpreter/empire access
  • Maintaining access on Windows
  • Upload and execute using empire
  • Backdoor a Windows system process with empire
  • Privilege escalation on Windows
  • Maintaining access on macOS
  • Privilege escalation on macOS
  • Privilege escalation on Linux
  • Pivoting using meterpreter autoroute

Useful books
Next

Unseen University, 2023, with a forest garden fostered by /ut7.
Read the Docs v: latest
Versions
latest
Downloads
On Read the Docs
Project Home
Builds