Red Team // Purple Team
kuorashi
Opérateur offensif spécialisé en simulation d'adversaires.
3+
Années
5+
Pentests
3
Certifications
$ cat ./profile.json
{ "alias": "kuorashi", "role": "Red Team Operator", "specialty": [ "Active Directory", "Adversary Simulation", "Red Team", "Purple Team" ], "spirit": "Zoro", "style": "Santoryu ⚔⚔⚔", "location": "France", "status": "available" } $ ./check_certs.sh
✓ CPTS — Certified Penetration Testing Specialist ✓ CRTP — Certified Red Team Professional ✓ CRTO — Certified Red Team Operator $ # Three swords. One goal.
// 01
À Propos
Red teamer passionné.
Spécialisé dans les environnements Active Directory, les techniques d'évasion EDR/AV, et la construction d'exercices purple-team. Je documente mes recherches et mes projets sur ce blog.
Comme Zoro et sa maîtrise de trois lames, je combine les disciplines offensives, défensives et analytiques pour améliorer au mieux les capacités défensives de vos équipes.
CPTS CRTP CRTO Red Team Purple Team MITRE ATT&CK Active Directory
// 02
Arsenal
Cobalt Strike
C2 / Beacon Ops
Sliver
Open-Source C2
BloodHound
AD Attack Graph
Rubeus / Kerbrute
Kerberos Attacks
Mimikatz
Credential Dump
Impacket Suite
Protocol Exploitation
NetExec
Network Exploitation
Responder / NTLMrelay
Relay Attacks
EvilGinx / GoPhish
Phishing Operations
Metasploit
Exploitation Framework
PowerView / ADModule
AD Enumeration
Custom Payload Dev
DLL / EXE / BOF
AD Trust Attacks
Cross-Domain / Forest
Delegation Abuse
Constrained / Uncons.
ACL / SID Abuse
Privilege Escalation
Burp Suite
Web Pentesting
Nmap / Masscan
Reconnaissance
PowerShell / Python
Scripting & Automation
Linux Privesc
OS Exploitation
Windows Privesc
OS Exploitation
Wireshark
Traffic Analysis
Volatility
Memory Forensics
OSINT
Open Source Intelligence
MITRE ATT&CK
Adversary Framework
Purple Team Ops
Joint Exercise Design
Red Team Planning
Scenario & TTP Design
Wazuh
SIEM / Detection
Sigma Rules
Detection Engineering
Threat Intelligence
TTP Mapping & Analysis
// 04
Contact
Disponible pour des missions de red team, purple team, ou pentest.
-----BEGIN PGP PUBLIC KEY BLOCK----- xjMEZ7HO9BYJKwYBBAHaRw8BAQdAhOuh2RnlAfqWR2EqKy1RdTJk3AjZuVK9 T1EGufWJP73NJ2t1b3Jhc2hpQHByb3Rvbi5tZSA8a3VvcmFzaGlAcHJvdG9u Lm1lPsKPBBMWCABBBQJnsc70CRCScpg6ewzCeBYhBPQMGS+0ACc3MGaOxJJy mDp7DMJ4AhsDAh4BAhkBAwsJBwIVCAMWAAIFJwkCBwIAAJJQAP4iB8SNoxSX Wv5OIeoE/mQGN1i46xodQxxj7R23Mv1EzQEAmitUHfxoIm1L9WTEXhiuK8a3 mIbZaz8HZN+iR/G6BwjOOARnsc70EgorBgEEAZdVAQUBAQdABgDyl03ZcSYT 2GsF8JMo1qV/GDIM4pn8qIr+k9fJbgkDAQoJwngEGBYIACoFAmexzvQJEJJy mDp7DMJ4FiEE9AwZL7QAJzcwZo7EknKYOnsMwngCGwwAAPzlAP9kv5U/LCmL QmKlUYzwg5pLkAqUq9eUomhwa3GOigLGwwEA8rNRlLilScmZBIwMOiuhymzv 8IjJW5YEG8uBe58emwA= =5i+D -----END PGP PUBLIC KEY BLOCK-----