Skip to content
SQUID SEC
Menu
  • Home
  • *NEW* SquidScan
  • Cheat Sheets
  • Hire SquidSec
  • SquidSec Team
  • Squid Sec Twitter
  • SquidSec Podcast
  • Home
  • *NEW* SquidScan
  • Cheat Sheets
  • Hire SquidSec
  • SquidSec Team
  • Squid Sec Twitter
  • SquidSec Podcast

Category: red-team

Active Directory Hacking Cheat Sheet
red-team

Active Directory Hacking Cheat Sheet

Active Directory remains the crown jewel of most enterprise environments — and the #1 target for red teamers, pentesters, and

by ☣️ Mr. The Plague ☣️
Read More
Modular Agentic Attack Surface Scanning — Built on Rails, Not Magic
pentesting

Modular Agentic Attack Surface Scanning — Built on Rails, Not Magic

Security teams today face a paradox. The attack surface is exploding — cloud assets, containers, APIs, shadow IT, and forgotten

by ☣️ Mr. The Plague ☣️
Read More
Leadership Reckoning in 2026: Actionable Blueprints for Senior Cybersecurity Leaders to Forge Enduring Resilience in a Weaponized, Borderless Digital Economy
blue-team

Leadership Reckoning in 2026: Actionable Blueprints for Senior Cybersecurity Leaders to Forge Enduring Resilience in a Weaponized, Borderless Digital Economy

This is the fifth and final installment in the “Building Resilience in a Globalized Digital Economy” series. Over the past

by ☣️ Mr. The Plague ☣️
Read More
BloodBash: A Lightweight Python Alternative to BloodHound for Active Directory Analysis
red-team

BloodBash: A Lightweight Python Alternative to BloodHound for Active Directory Analysis

Active Directory (AD) reconnaissance is a critical step in red team engagements, penetration testing, and security assessments. Traditionally, tools like

by ☣️ Mr. The Plague ☣️
Read More
The December 2025 Ubisoft Incident: Rainbow Six Siege Backend Compromise and Exaggerated Breach Claims
weekly-brief

The December 2025 Ubisoft Incident: Rainbow Six Siege Backend Compromise and Exaggerated Breach Claims

Ubisoft data breach 2025 In the world of enterprise information security, few incidents highlight the perils of backend misconfigurations and

by ☣️ Mr. The Plague ☣️
Read More
HackMap: A Powerful Local Penetration Testing Mapping Tool for Advanced Graph Note Keeping
blue-team

HackMap: A Powerful Local Penetration Testing Mapping Tool for Advanced Graph Note Keeping

In the world of ethical hacking and penetration testing, visualizing attack paths and managing command history can make all the

by ☣️ Mr. The Plague ☣️
Read More
CyberDeck: The Ultimate Retro Sci-Fi Hacker’s Cookbook for Red Teamers & Pentesters
pentesting

CyberDeck: The Ultimate Retro Sci-Fi Hacker’s Cookbook for Red Teamers & Pentesters

In the ever-evolving landscape of offensive security—where cloud misconfigs, Active Directory attacks, and living-off-the-land binaries dominate engagements—speed and muscle memory

by ☣️ Mr. The Plague ☣️
Read More
CVE-2025-53770 Microsoft Releases Urgent Patch for Critical SharePoint Vulnerability Under Active Exploitation
Exploits

CVE-2025-53770 Microsoft Releases Urgent Patch for Critical SharePoint Vulnerability Under Active Exploitation

Microsoft has released out-of-band security updates to address a critical remote code execution vulnerability in on-premises SharePoint Server that is

by ☣️ Mr. The Plague ☣️
Read More
New Episode of SquidSec Podcast is Live! –
Cyber Security

New Episode of SquidSec Podcast is Live! –

by ☣️ Mr. The Plague ☣️
Read More
Abusing Software Supply Chain Vulnerabilities: A Comprehensive Analysis of Attacks, Techniques, and Defenses
Cyber Security

Abusing Software Supply Chain Vulnerabilities: A Comprehensive Analysis of Attacks, Techniques, and Defenses

Introduction Software supply chain attacks have become a cornerstone of modern cyber threats, exploiting the intricate web of dependencies, tools,

by ☣️ Mr. The Plague ☣️
Read More

Posts pagination

1 2 3 Next
SQUID SECURITY LLC 2026