You've successfully subscribed to RedHeadSec
Great! Next, complete checkout for full access to RedHeadSec
Welcome back! You've successfully signed in
Success! Your account is fully activated, you now have access to all content.
RedHeadSec

RedHeadSec

Tales of Cybersecurity, Threat Research, CTFs, and Offensive operations

SCCM - Microsoft's Native C2

SCCM - Microsoft's Native C2

A lot of hype has come out around System Center Configuration Manager (SCCM), Microsoft's software management suite that allows administra

in
SCCM - Microsoft's Native C2

SCCM - Microsoft's Native C2

A lot of hype has come out around System Center Configuration Manager (SCCM), Microsoft's software management suite that allows administra

in
Hack The Box - Support

Hack The Box - Support

Hack The Box walkthrough of the machine Support

in
Compatibility to Compromise

Compatibility to Compromise

How legacy compatibility options and misconfigured ADCS can lead to a real bad day.

in
Red Team Operator 2 Review

Red Team Operator 2 Review

Red Team Operator 2 is the continuation of the educational content and certifications from RastaMouse at Zero Point Security. This builds upon

in
Check out some custom tumblers + more!

Check out some custom tumblers + more!

❗WARNING: This has nothing to do with Cybersecurity or anything technical at all. Warned ya! Just wanted to throw out a shameless plug here f

New Role, New AD Takeover

New Role, New AD Takeover

Hello World! It's been a while, but not without justification. I've been adjusting to a new job position, Offensive Security consult

in
Napping - TryHackMe Walkthrough

Napping - TryHackMe Walkthrough

This is a quick walkthrough of Napping on TryHackMe. https://tryhackme.com/room/nappingis1337 The room does not give any hints/walkthroughs

in
Building a simple custom implant for AV bypassing

Building a simple custom implant for AV bypassing

Building a C++ implant for Sliver Shellcode

in