Skip to content

Search

Recent Posts

  • GoGetC2 – Build Command and Control (Part 3)
  • GoGetC2 – Build Command and Control (Part 2)
  • GoGetC2 – Build Command and Control (Part 1)
  • Code Injection – DLL
  • SANS Index Builder

Categories

  • Linux
  • Malware
  • Red Team
  • Tools
  • Walkthrough
  • About
  • Blog
  • Contact
  • Home
  • Sample Page
The Adversarial Logbook
The Adversarial Logbook
Tools

GoGetC2 – Build Command and Control (Part 3)

GoGetC2 is now able to communicate...
C0deRedJul 22, 2025
Tools

GoGetC2 – Build Command and Control (Part 2)

If you had a chance to...
C0deRedJul 21, 2025
Tools

GoGetC2 – Build Command and Control (Part 1)

Build a C2 using Golang that...
C0deRedJul 14, 2025
Red Team

Code Injection – DLL

Overview: By running malicious payloads inside...
C0deRedJun 16, 2025
Tools

SANS Index Builder

A lightweight Flask web app for...
C0deRedJun 16, 2025
Linux

Linux Useful Commands

Set the Target IP Address to...
C0deRedOct 16, 2023Jun 16, 2025
Linux

Add your SSH key through Reserve Shell user

When you run "sudo -l", if...
C0deRedOct 15, 2023Jun 16, 2025
LinuxWalkthrough

Linux Privilege Escalation (Part 1)

MySQL Root Exploit via UDF Scenario:...
C0deRedOct 10, 2023Jun 16, 2025
Malware

Backdooring PE Files

Backdooring PE (Portable Executable) files is...
C0deRedMay 30, 2023Jun 16, 2025
Malware

Code Injection

There are several methods to perform...
C0deRedMay 30, 2023Jun 16, 2025
12