# Redteam红队

- [Web类](https://www.heresecurity.wiki/redteam-hong-dui/web-lei.md)
- [web程序漏洞](https://www.heresecurity.wiki/redteam-hong-dui/web-lei/web-cheng-xu-lou-dong.md)
- [编辑器漏洞](https://www.heresecurity.wiki/redteam-hong-dui/web-lei/bian-ji-qi-lou-dong.md)
- [默认密码](https://www.heresecurity.wiki/redteam-hong-dui/web-lei/mo-ren-mi-ma.md)
- [wso2](https://www.heresecurity.wiki/redteam-hong-dui/web-lei/wso2.md)
- [从LFI到RCE](https://www.heresecurity.wiki/redteam-hong-dui/web-lei/cong-lfi-dao-rce.md)
- [深x服](https://www.heresecurity.wiki/redteam-hong-dui/web-lei/shenxfu.md)
- [天r信](https://www.heresecurity.wiki/redteam-hong-dui/web-lei/tianrxin.md)
- [邮件地址payload](https://www.heresecurity.wiki/redteam-hong-dui/web-lei/you-jian-di-zhi-payload.md)
- [Web server日志分析命令](https://www.heresecurity.wiki/redteam-hong-dui/web-lei/web-server-ri-zhi-fen-xi-ming-ling.md)
- [免杀技巧](https://www.heresecurity.wiki/redteam-hong-dui/mian-sha-ji-qiao.md)
- [cshot远程shellcode](https://www.heresecurity.wiki/redteam-hong-dui/mian-sha-ji-qiao/cshot-yuan-cheng-shellcode.md)
- [Pezor免杀](https://www.heresecurity.wiki/redteam-hong-dui/mian-sha-ji-qiao/pezor-mian-sha.md)
- [内存中解码shellcode绕过av](https://www.heresecurity.wiki/redteam-hong-dui/mian-sha-ji-qiao/nei-cun-zhong-jie-ma-shellcode-rao-guo-av.md)
- [一些可尝试绕过白名单的执行](https://www.heresecurity.wiki/redteam-hong-dui/mian-sha-ji-qiao/yi-xie-ke-chang-shi-rao-guo-bai-ming-dan-de-zhi-xing.md)
- [在Windows Server 2016和2019中绕过WindowsDefender](https://www.heresecurity.wiki/redteam-hong-dui/mian-sha-ji-qiao/zai-windows-server-2016-he-2019-zhong-rao-guo-windowsdefender.md)
- [绕过安全狗脚本](https://www.heresecurity.wiki/redteam-hong-dui/mian-sha-ji-qiao/rao-guo-an-quan-gou-jiao-ben.md)
- [360白名单](https://www.heresecurity.wiki/redteam-hong-dui/mian-sha-ji-qiao/360-bai-ming-dan.md)
- [Bypass AMSI](https://www.heresecurity.wiki/redteam-hong-dui/mian-sha-ji-qiao/bypass-amsi.md)
- [Bypass技巧](https://www.heresecurity.wiki/redteam-hong-dui/bypass-ji-qiao.md)
- [Bypass mod\_security](https://www.heresecurity.wiki/redteam-hong-dui/bypass-ji-qiao/bypass-mod_security.md)
- [绕过lsa protection](https://www.heresecurity.wiki/redteam-hong-dui/bypass-ji-qiao/rao-guo-lsa-protection.md)
- [系统类](https://www.heresecurity.wiki/redteam-hong-dui/xi-tong-lei.md)
- [ImportDLLInjection 通过修改内存中的PE头来注入DLL的另一种方法](https://www.heresecurity.wiki/redteam-hong-dui/xi-tong-lei/importdllinjection-tong-guo-xiu-gai-nei-cun-zhong-de-pe-tou-lai-zhu-ru-dll-de-ling-yi-zhong-fang-fa.md)
- [动态调用进程注入逻辑](https://www.heresecurity.wiki/redteam-hong-dui/xi-tong-lei/dong-tai-diao-yong-jin-cheng-zhu-ru-luo-ji.md)
- [父进程破坏](https://www.heresecurity.wiki/redteam-hong-dui/xi-tong-lei/fu-jin-cheng-po-huai.md)
- [进程挖空(MitreT1055.012)](https://www.heresecurity.wiki/redteam-hong-dui/xi-tong-lei/jin-cheng-wa-kong-mitret1055.012.md)
- [使用WindowsDefender下载文件](https://www.heresecurity.wiki/redteam-hong-dui/xi-tong-lei/shi-yong-windowsdefender-xia-zai-wen-jian.md)
- [通过挂起EventLog服务线程禁用Windows事件日志](https://www.heresecurity.wiki/redteam-hong-dui/xi-tong-lei/tong-guo-gua-qi-eventlog-fu-wu-xian-cheng-jin-yong-windows-shi-jian-ri-zhi.md)
- [隐藏windows服务](https://www.heresecurity.wiki/redteam-hong-dui/xi-tong-lei/yin-cang-windows-fu-wu.md)
- [远程解压文件](https://www.heresecurity.wiki/redteam-hong-dui/xi-tong-lei/yuan-cheng-jie-ya-wen-jian.md)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://www.heresecurity.wiki/redteam-hong-dui.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
