Cyber security #97
Unanswered
44783farmer
asked this question in
Q&A
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi everyone,
I’m an aspiring cybersecurity professional with a strong interest in red teaming and advanced threat simulation. I'm particularly eager to understand the techniques and tools used in controlled environments for simulating real-world attacks — such as remote code execution, payload delivery, and post-exploitation techniques — all strictly within legal and ethical boundaries.
If anyone here is experienced in developing or using such tools (e.g., C2 frameworks like Cobalt Strike, Mythic, or Empire), I would deeply appreciate any guidance, learning resources, or mentorship. I’m also open to participating in ethical hacking labs like Hack The Box or TryHackMe, and I’m willing to contribute to any related open-source projects.
Thank you in advance for any help or direction!
richardsonwakingson@gmail.com
Beta Was this translation helpful? Give feedback.
All reactions