The Red Team Vade Mecum
Search…
The Red Team Vade Mecum
The Red Team Vade Mecum
Techniques
Defense Evasion
Binary Properties and Code Signing
ATA/ATP
Tips and Tricks
Basics
Disabling/Patching Telemetry
Minimization
Misdirection
Command Line Argument Spoofing
PPID Spoofing via CreateProcess
Switching Parents
Hiding our Payloads
IPC For Evasion and Control
Privilege Escalation
Enumeration
Execution
Initial Access
Lateral Movement
Code Injection
Persistence
Infrastructure
SQL
Other
Windows Internals
Powered By
GitBook
Misdirection
Here are the articles in this section:
Command Line Argument Spoofing
PPID Spoofing via CreateProcess
Switching Parents
Previous
DLL Hollowing
Next
Command Line Argument Spoofing
Last modified
1yr ago
Copy link