We are going live tonight at 7 PM EST
@everyone we are going live tonight at 7 PM EST.
Episode 34: Spawning a process through token impersonation. The proper way to gain another process's user privileges.
truecyber.world
#redteam #training
04.03.2026 17:28 β
π 0
π 0
π¬ 0
π 0
TrueCyber
TrueCyber
Weβre going live tonight at 7 PM EST.
Tonightβs session is about revisiting obfuscation and evasion techniques to hide malicious payloads from EDRs. Weβll discuss whatβs working in 2026 and what can be done to ensure your tooling remains effective.
truecyber.world
11.02.2026 15:43 β
π 0
π 0
π¬ 0
π 0
TrueCyber
TrueCyber
We are going live tonight at 7 PM EST.
This session is about understanding how drivers can be misused to kill protected processes such as EDRs. We will explore and learn how to identify kernel drivers that can be exploited and how to automate the process.
truecyber.world
#redteaming #pentest
07.01.2026 14:12 β
π 1
π 0
π¬ 0
π 0
TrueCyber
TrueCyber
We are going live tonight at 7 PM EST.
We have a special guest from Flare tonight. Flare specializes in continuous monitoring of dark and clear web sources, gathering information from various sources.
Lets see how the data can be used during a red team exercise.
truecyber.world
03.12.2025 15:22 β
π 0
π 0
π¬ 0
π 0
This is your last chance to benefit from the Black Friday deals on my learning platforms. Get up to 60% OFF on the bundle. You can even get an extra 10% OFF if you check the page source code.
Offer end on Sunday!
truecyber.world/promo.me
#BlackFriday #redteam #Training
28.11.2025 18:18 β
π 0
π 0
π¬ 0
π 0
Black Friday sale on TrueCyber content and Mr.Un1k0d3r platform: up to 60% OFF.
There is a challenge hidden in the promo page source code to get an extra 10% OFF π
truecyber.world/promo.me
#RedTeaming #learningplatform #BlackFriday
14.11.2025 14:35 β
π 1
π 0
π¬ 0
π 0
TrueCyber
TrueCyber
Indeed truecyber.world is the correct URL
05.11.2025 18:48 β
π 1
π 0
π¬ 0
π 0
We are going live tonight at 7 PM EST.
Tonight, we continue building a reconnaissance tool for Azure to identify Azure attack vectors. This is Part III and the final part of our Azure journey.
truecyber.world
#Azure #redteaming
05.11.2025 14:09 β
π 0
π 0
π¬ 1
π 0
TrueCyber
TrueCyber
We are going live tonight at 7 PM EDT.
Tonight's session is about Microsoft Azure. We will do a deep dive into how it can be abused as part of a red team. We will automate the process by writing a complete tool to perform attacks and reconnaissance.
truecyber.world
01.10.2025 13:21 β
π 2
π 0
π¬ 0
π 0
#redteam #azure | Charles F. Hamilton
FranΓ§ais plus bas
Interested in learning more about Azure built-in applications that can be misused? Here is another one that allows you to list all the applications deployed within your tenant. A st...
Interested in attack vectors in Azure.
I have documented another example to have read permission on all the applications exposed in the tenant and more. Blocking default applications is crucial to prevent such vectors.
www.linkedin.com/posts/charle...
#Azure #RedTeam
23.09.2025 17:08 β
π 0
π 0
π¬ 0
π 0
I'm working on a useful tool that allowed me to discover quite a few interesting attack vectors in Azure.
UsersPermissionToReadOtherUsersEnabled bypass
MFA bypass
Privileges escalation
And more
www.linkedin.com/posts/charle...
#Azure #RedTeam
17.09.2025 17:06 β
π 2
π 0
π¬ 0
π 0
TrueCyber
TrueCyber
We are going live tonight at 7 PM EDT.
Tonight's session is about running your own LLM locally and building a simple cross-platform .NET client interface to interact with it. The private LLM is quite useful during red team exercises.
truecyber.world
03.09.2025 13:25 β
π 0
π 0
π¬ 0
π 0
GitHub - Mr-Un1k0d3r/DotnetNoVirtualProtectShellcodeLoader: load shellcode without P/D Invoke and VirtualProtect call.
load shellcode without P/D Invoke and VirtualProtect call. - Mr-Un1k0d3r/DotnetNoVirtualProtectShellcodeLoader
You want to load your shellcode in .NET without calling VirtualProtect? Use RuntimeHelpers.PrepareMethod to create a predictable RWX memory region for you. This method also doesn't require a delegate function pointer, since you override a .NET method.
github.com/Mr-Un1k0d3r/...
02.09.2025 13:50 β
π 2
π 0
π¬ 0
π 0
Mr.Un1k0d3r Offensive Red Team Training
It's time for the long weekend sale!
Get 50% OFF when you purchase both the Coding Class and the Red Team Training for just $400 (regularly $800). This includes over 200 hours of videos and source code.
More details here mr.un1k0d3r.world/training/a6e...
#redteam #discount
28.08.2025 13:58 β
π 1
π 0
π¬ 0
π 0
TrueCyber
TrueCyber
We are going live tonight at 7 PM EDT.
Tonight's session is about understanding the underlying concepts of Active Directory Certificate Service (ADCS) and how certificate templates can be audited using C#.
truecyber.world
06.08.2025 13:18 β
π 0
π 0
π¬ 0
π 0
TrueCyber
TrueCyber
We are going live tonight at 7 PM EST.
Tonight's session is about auditing and searching for misconfigured GPOs using C# during a red team exercise.
truecyber.world
23.07.2025 13:15 β
π 1
π 0
π¬ 0
π 0
TrueCyber
TrueCyber
We are going live tonight at 7 PM EDT.
Tonight's episode is about writing your own SOCKS5 proxy that can serve as your complete C2, allowing you to perform all operations remotely.
truecyber.world
02.07.2025 12:57 β
π 1
π 0
π¬ 0
π 0
TrueCyber
TrueCyber
We are going live tonight at 7 PM!
Tonight's session is about incorporating sandbox evasion techniques into your malware using C and C#.
truecyber.world
04.06.2025 15:11 β
π 1
π 0
π¬ 0
π 0
Shellcode architecture matter too make sure you use x86 shellcode if you are using anycpu in VS.
19.05.2025 23:00 β
π 1
π 0
π¬ 0
π 0
Wonderful I know that sometime I go fast. But happy to hear to you got most of it live.
17.05.2025 13:35 β
π 1
π 0
π¬ 1
π 0
TrueCyber
TrueCyber
The upcoming live session will be presented live from @northsec.io this Friday, May 16, 2025, at 1 PM EST.
We will be chaining a novel technique in .NET that does not require any RWX memory allocation or external APIs.
truecyber.world
15.05.2025 02:24 β
π 2
π 0
π¬ 1
π 0