<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://secybr.com/</id><title>secybr | penetration testing, red teaming and hack tricks.</title><subtitle>penetration testing, red teaming and hack tricks.</subtitle> <updated>2025-08-26T23:41:36+03:00</updated> <author> <name>0xhav0c</name> <uri>https://secybr.com/</uri> </author><link rel="self" type="application/atom+xml" href="https://secybr.com/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://secybr.com/"/> <generator uri="https://jekyllrb.com/" version="4.2.2">Jekyll</generator> <rights> © 2025 0xhav0c </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>HTB Certified Active Directory Pentesting Expert (CAPE) - How to Pass</title><link href="https://secybr.com/posts/htb-certified-active-directory-pentesting-expert-cape-review/" rel="alternate" type="text/html" title="HTB Certified Active Directory Pentesting Expert (CAPE) - How to Pass" /><published>2025-08-23T12:00:00+03:00</published> <updated>2025-08-23T12:00:00+03:00</updated> <id>https://secybr.com/posts/htb-certified-active-directory-pentesting-expert-cape-review/</id> <content src="https://secybr.com/posts/htb-certified-active-directory-pentesting-expert-cape-review/" /> <author> <name>0xhav0c</name> </author> <category term="certification" /> <category term="cape" /> <summary> Those of you who read my “Certified Red Team Professional (CRTP) - How to Pass” article will remember that at the end of it, I set myself a new goal and said, “the next fortress to conquer will be the HTB Certified Active Directory Pentesting Expert (CAPE).” That day has come, and I’m here to happily announce that I have conquered that fortress! In this article, I will dive deep into this ch... </summary> </entry> <entry><title>Certified Red Team Professional (CRTP) - How to Pass</title><link href="https://secybr.com/posts/certified-red-team-professional-CRTP-review/" rel="alternate" type="text/html" title="Certified Red Team Professional (CRTP) - How to Pass" /><published>2025-03-27T00:00:00+03:00</published> <updated>2025-03-27T00:00:00+03:00</updated> <id>https://secybr.com/posts/certified-red-team-professional-CRTP-review/</id> <content src="https://secybr.com/posts/certified-red-team-professional-CRTP-review/" /> <author> <name>0xhav0c</name> </author> <category term="certification" /> <category term="crtp" /> <summary> Certified Red Team Professional (CRTP) - How to Pass I won’t go into detail about what CRTP is or who it’s suitable for. If you’re aiming for this certification, you already know the basics. If you want to get to the most critical information quickly, the TL;DR section below is for you! TL;DR Who is it suitable for: A great introductory certification for those looking to step into the Red... </summary> </entry> <entry><title>Dumping LSASS Without Mimikatz</title><link href="https://secybr.com/posts/dumping-lsass-without-mimikatz/" rel="alternate" type="text/html" title="Dumping LSASS Without Mimikatz" /><published>2022-12-08T00:00:00+03:00</published> <updated>2022-12-08T15:05:37+03:00</updated> <id>https://secybr.com/posts/dumping-lsass-without-mimikatz/</id> <content src="https://secybr.com/posts/dumping-lsass-without-mimikatz/" /> <author> <name>0xhav0c</name> </author> <summary> Mimikatz is a tool for dumping credentials from memory in Windows. It is a great tool for lateral and vertical privilege escalation in Windows Active Directory environments. Due to its popularity, the Mimikatz executable and PowerShell script are detected by most of the Antivirus (AV) solutions out there. In this article, I will talk about using several alternative methods to achieve the same g... </summary> </entry> <entry><title>Collecting Target Email Addresses</title><link href="https://secybr.com/posts/collecting-target-email-address/" rel="alternate" type="text/html" title="Collecting Target Email Addresses" /><published>2022-12-07T00:00:00+03:00</published> <updated>2022-12-08T16:57:53+03:00</updated> <id>https://secybr.com/posts/collecting-target-email-address/</id> <content src="https://secybr.com/posts/collecting-target-email-address/" /> <author> <name>0xhav0c</name> </author> <category term="red team" /> <category term="reconing" /> <summary> app.snov.io Collecting email address from company name Free &amp;amp; Premium Features. Creating Mail Address List From Name and Surname metricsparrow.com Creating email address from Name &amp;amp; Surname (Like bruteforce with wordlist) Verification Mail Address Verification with this python script : github.com/0xhav0c/valid-email-scanner You can use the following online applications to determi... </summary> </entry> <entry><title>Evasion Tactics For Scanning Targets (Active Scan)</title><link href="https://secybr.com/posts/evasion-tactics-for-scanning-targets/" rel="alternate" type="text/html" title="Evasion Tactics For Scanning Targets (Active Scan)" /><published>2022-12-06T00:00:00+03:00</published> <updated>2022-12-08T16:33:07+03:00</updated> <id>https://secybr.com/posts/evasion-tactics-for-scanning-targets/</id> <content src="https://secybr.com/posts/evasion-tactics-for-scanning-targets/" /> <author> <name>0xhav0c</name> </author> <category term="red team" /> <category term="reconing" /> <summary> IDS / IPS Firewall Detection Techniques Sending Bad Checksums TCP ACK Scan (-sA) Sending Bad Checksums nmap --badsum &amp;lt;target IP&amp;gt; (–badsum is used to send the packets with bad or bogus TCP/UDP checksums to the intended target to avoid certain firewall rulesets) The scan result shows all ports are filtered, indicating that there is no response or the packets are dropped, and thus ... </summary> </entry> </feed>
