<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://x4sh3s.github.io/</id><title>x4sh3s</title><subtitle>A Blog where i share stuff that i learned, created or found related to red teaming and Cybersecurity In General ...</subtitle> <updated>2023-12-10T22:12:47+01:00</updated> <author> <name>Brahim Chebli</name> <uri>https://x4sh3s.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://x4sh3s.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://x4sh3s.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.3.2">Jekyll</generator> <rights> © 2023 Brahim Chebli </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Certified Red Team Lead (CRTL) Review -- Struggle and Joy Certification</title><link href="https://x4sh3s.github.io/posts/Certified-Red-Team-Lead-CRTL-Review-Struggle-and-Joy-Certification/" rel="alternate" type="text/html" title="Certified Red Team Lead (CRTL) Review -- Struggle and Joy Certification" /><published>2023-12-06T00:32:00+01:00</published> <updated>2023-12-06T00:32:00+01:00</updated> <id>https://x4sh3s.github.io/posts/Certified-Red-Team-Lead-CRTL-Review-Struggle-and-Joy-Certification/</id> <content src="https://x4sh3s.github.io/posts/Certified-Red-Team-Lead-CRTL-Review-Struggle-and-Joy-Certification/" /> <author> <name>x4sh3s</name> </author> <category term="Defense Evasion" /> <category term="Certifications Review" /> <summary> In this post, i’ll be reviewing CRTL certification, my learning and exam experience with some tips and resources. Introduction After successfully obtaining my CRTO certification on July 4, I immediately purchased the next course in line, CRTL (CRTO II). I wasn’t fully prepared for it, but I bought it anyway to push myself to study. I was eager to enhance my red teaming skills, particularly on... </summary> </entry> <entry><title>Divide And Bypass: A new Simple Way to Bypass AMSI</title><link href="https://x4sh3s.github.io/posts/Divide-and-bypass-amsi/" rel="alternate" type="text/html" title="Divide And Bypass: A new Simple Way to Bypass AMSI" /><published>2022-12-09T17:32:00+01:00</published> <updated>2022-12-10T14:20:24+01:00</updated> <id>https://x4sh3s.github.io/posts/Divide-and-bypass-amsi/</id> <content src="https://x4sh3s.github.io/posts/Divide-and-bypass-amsi/" /> <author> <name>x4sh3s</name> </author> <category term="Defense Evasion" /> <summary> This post is about a new simple way to bypass AMSI (Antimalware Scan Interface), that can be applied on small scripts, specially the popular AMSI bypasses. Introduction In the last few years, Powershell become so popular and a great target for hackers, as it provide access to almost all windows’s components, due to its integration with .NET framework, which allows us, Offensive security guys ... </summary> </entry> </feed>
