Installing OLE Tools on Windows
Category: malware

REVIEW: RED TEAM Operator: Privilege Escalation in Windows Course by SEKTOR7 Institute
This is my review of the RED TEAM Operator: Privilege Escalation in Windows course offered by SEKTOR7 Institute. As an affiliate, I make money with qualifying purchases. RED TEAM Operator: Privilege Escalation in Windows is a brief introduction to the subject. As with other offerings by SEKTOR7, this course expects that you know the basics of …

REVIEW: RED TEAM Operator: Malware Development Intermediate Course by SEKTOR7 Institute
REVIEW: RED TEAM Operator: Malware Development Intermediate Course by SEKTOR7 Institute.

REVIEW: RED TEAM Operator: Windows Evasion Course by SEKTOR7 Institute
REVIEW: RED TEAM Operator: Windows Evasion Course by SEKTOR7 Institute.
Enumerating Modules with CreateToolhelp32Snapshot
Enumerate modules with CreateToolhelp32Snapshot.
Enumerating Processes with CreateToolhelp32Snapshot
Quick and dirty example of process enumeration using CreateToolhelp32Snapshot
Enumerating Processes with WTSEnumerateProcesses
Quick example of using WTSEnumerateProcesses to enumerate processes running on a Windows machine.
Finding Processes With Suspicious CWD Using procfs
Find malware running from temporary directories using procfs.

Finding Masquerading Processes With procfs
Find masquerading processes using procfs.
Using procfs For Forensics and Incident Response
Using procfs For Forensics and Incident Response.
Toggling Chrome Safe Browsing
Toggle Safe Browsing in Google Chrome.
Post-Exploitation With gawk
Some post exploitation techniques using gawk.