Tools GoGetC2 – Build Command and Control (Part 3) GoGetC2 is now able to communicate... C0deRedJul 22, 2025 Tools GoGetC2 – Build Command and Control (Part 2) If you had a chance to... C0deRedJul 21, 2025 Tools GoGetC2 – Build Command and Control (Part 1) Build a C2 using Golang that... C0deRedJul 14, 2025 Red Team Code Injection – DLL Overview: By running malicious payloads inside... C0deRedJun 16, 2025 Tools SANS Index Builder A lightweight Flask web app for... C0deRedJun 16, 2025 Linux Linux Useful Commands Set the Target IP Address to... C0deRedOct 16, 2023Jun 16, 2025 Linux Add your SSH key through Reserve Shell user When you run "sudo -l", if... C0deRedOct 15, 2023Jun 16, 2025 LinuxWalkthrough Linux Privilege Escalation (Part 1) MySQL Root Exploit via UDF Scenario:... C0deRedOct 10, 2023Jun 16, 2025 Malware Backdooring PE Files Backdooring PE (Portable Executable) files is... C0deRedMay 30, 2023Jun 16, 2025 Malware Code Injection There are several methods to perform... C0deRedMay 30, 2023Jun 16, 2025 12
Tools GoGetC2 – Build Command and Control (Part 2) If you had a chance to... C0deRedJul 21, 2025 Tools GoGetC2 – Build Command and Control (Part 1) Build a C2 using Golang that... C0deRedJul 14, 2025 Red Team Code Injection – DLL Overview: By running malicious payloads inside... C0deRedJun 16, 2025 Tools SANS Index Builder A lightweight Flask web app for... C0deRedJun 16, 2025 Linux Linux Useful Commands Set the Target IP Address to... C0deRedOct 16, 2023Jun 16, 2025 Linux Add your SSH key through Reserve Shell user When you run "sudo -l", if... C0deRedOct 15, 2023Jun 16, 2025 LinuxWalkthrough Linux Privilege Escalation (Part 1) MySQL Root Exploit via UDF Scenario:... C0deRedOct 10, 2023Jun 16, 2025 Malware Backdooring PE Files Backdooring PE (Portable Executable) files is... C0deRedMay 30, 2023Jun 16, 2025 Malware Code Injection There are several methods to perform... C0deRedMay 30, 2023Jun 16, 2025 12
Tools GoGetC2 – Build Command and Control (Part 1) Build a C2 using Golang that... C0deRedJul 14, 2025 Red Team Code Injection – DLL Overview: By running malicious payloads inside... C0deRedJun 16, 2025 Tools SANS Index Builder A lightweight Flask web app for... C0deRedJun 16, 2025 Linux Linux Useful Commands Set the Target IP Address to... C0deRedOct 16, 2023Jun 16, 2025 Linux Add your SSH key through Reserve Shell user When you run "sudo -l", if... C0deRedOct 15, 2023Jun 16, 2025 LinuxWalkthrough Linux Privilege Escalation (Part 1) MySQL Root Exploit via UDF Scenario:... C0deRedOct 10, 2023Jun 16, 2025 Malware Backdooring PE Files Backdooring PE (Portable Executable) files is... C0deRedMay 30, 2023Jun 16, 2025 Malware Code Injection There are several methods to perform... C0deRedMay 30, 2023Jun 16, 2025 12
Red Team Code Injection – DLL Overview: By running malicious payloads inside... C0deRedJun 16, 2025 Tools SANS Index Builder A lightweight Flask web app for... C0deRedJun 16, 2025 Linux Linux Useful Commands Set the Target IP Address to... C0deRedOct 16, 2023Jun 16, 2025 Linux Add your SSH key through Reserve Shell user When you run "sudo -l", if... C0deRedOct 15, 2023Jun 16, 2025 LinuxWalkthrough Linux Privilege Escalation (Part 1) MySQL Root Exploit via UDF Scenario:... C0deRedOct 10, 2023Jun 16, 2025 Malware Backdooring PE Files Backdooring PE (Portable Executable) files is... C0deRedMay 30, 2023Jun 16, 2025 Malware Code Injection There are several methods to perform... C0deRedMay 30, 2023Jun 16, 2025 12
Tools SANS Index Builder A lightweight Flask web app for... C0deRedJun 16, 2025 Linux Linux Useful Commands Set the Target IP Address to... C0deRedOct 16, 2023Jun 16, 2025 Linux Add your SSH key through Reserve Shell user When you run "sudo -l", if... C0deRedOct 15, 2023Jun 16, 2025 LinuxWalkthrough Linux Privilege Escalation (Part 1) MySQL Root Exploit via UDF Scenario:... C0deRedOct 10, 2023Jun 16, 2025 Malware Backdooring PE Files Backdooring PE (Portable Executable) files is... C0deRedMay 30, 2023Jun 16, 2025 Malware Code Injection There are several methods to perform... C0deRedMay 30, 2023Jun 16, 2025 12
Linux Linux Useful Commands Set the Target IP Address to... C0deRedOct 16, 2023Jun 16, 2025 Linux Add your SSH key through Reserve Shell user When you run "sudo -l", if... C0deRedOct 15, 2023Jun 16, 2025 LinuxWalkthrough Linux Privilege Escalation (Part 1) MySQL Root Exploit via UDF Scenario:... C0deRedOct 10, 2023Jun 16, 2025 Malware Backdooring PE Files Backdooring PE (Portable Executable) files is... C0deRedMay 30, 2023Jun 16, 2025 Malware Code Injection There are several methods to perform... C0deRedMay 30, 2023Jun 16, 2025 12
Linux Add your SSH key through Reserve Shell user When you run "sudo -l", if... C0deRedOct 15, 2023Jun 16, 2025 LinuxWalkthrough Linux Privilege Escalation (Part 1) MySQL Root Exploit via UDF Scenario:... C0deRedOct 10, 2023Jun 16, 2025 Malware Backdooring PE Files Backdooring PE (Portable Executable) files is... C0deRedMay 30, 2023Jun 16, 2025 Malware Code Injection There are several methods to perform... C0deRedMay 30, 2023Jun 16, 2025 12
LinuxWalkthrough Linux Privilege Escalation (Part 1) MySQL Root Exploit via UDF Scenario:... C0deRedOct 10, 2023Jun 16, 2025 Malware Backdooring PE Files Backdooring PE (Portable Executable) files is... C0deRedMay 30, 2023Jun 16, 2025 Malware Code Injection There are several methods to perform... C0deRedMay 30, 2023Jun 16, 2025 12
Malware Backdooring PE Files Backdooring PE (Portable Executable) files is... C0deRedMay 30, 2023Jun 16, 2025 Malware Code Injection There are several methods to perform... C0deRedMay 30, 2023Jun 16, 2025 12