<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>red | RobWillis.info</title>
	<atom:link href="/tag/red/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>#yolosec</description>
	<lastBuildDate>Mon, 15 Dec 2025 02:19:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Revisiting Purple Teaming AD with BloodHound CE &#038; AD-Miner</title>
		<link>/2025/12/revisiting-purple-teaming-ad-with-bloodhound-ce-ad-miner/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Fri, 05 Dec 2025 01:07:35 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[AD Miner]]></category>
		<category><![CDATA[BloodHound]]></category>
		<category><![CDATA[blue]]></category>
		<category><![CDATA[Purple]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[team]]></category>
		<guid isPermaLink="false">/?p=7703</guid>

					<description><![CDATA[<p>A few months ago, I published a blog post that involved managing Bloodhound CE with Docker Compose: Purple Teaming AD with BloodHound CE &#038; AD-Miner Since then, BloodHound CE has seen some pretty significant improvements, including new tools to simplify container management. Because of this, I wanted to revisit this setup and put together an [&#8230;]</p>
The post <a href="/2025/12/revisiting-purple-teaming-ad-with-bloodhound-ce-ad-miner/">Revisiting Purple Teaming AD with BloodHound CE & AD-Miner</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Windows EDR: Telemetry &#038; Sensors &#8211; Mind Map</title>
		<link>/2025/09/windows-edr-telemetry-sensors/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Thu, 18 Sep 2025 11:57:32 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[blue]]></category>
		<category><![CDATA[Bypass]]></category>
		<category><![CDATA[EDR]]></category>
		<category><![CDATA[Internals]]></category>
		<category><![CDATA[Purple]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[team]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=7442</guid>

					<description><![CDATA[<p>I recently read Evading EDR by Matt Hand. While not a lengthy book, it&#8217;s technically dense and packed with tons of valuable information about Windows and EDR internals. It&#8217;s a fantastic resource, and I highly recommend it: Evading EDR by Matt Hand To help solidify my understanding of the concepts and apply them in future [&#8230;]</p>
The post <a href="/2025/09/windows-edr-telemetry-sensors/">Windows EDR: Telemetry & Sensors – Mind Map</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Purple Teaming AD with BloodHound CE &#038; AD-Miner</title>
		<link>/2025/03/purple-teaming-ad-with-bloodhound-community-edition-ad-miner/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Wed, 12 Mar 2025 13:42:51 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[AD]]></category>
		<category><![CDATA[BloodHound]]></category>
		<category><![CDATA[blue]]></category>
		<category><![CDATA[Purple]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[team]]></category>
		<guid isPermaLink="false">/?p=6147</guid>

					<description><![CDATA[<p>BloodHound is one of those tools that everyone in the industry seems to have heard of and it tends to generate a buzz amongst engineers anytime it&#8217;s brought up. This reputation is well-deserved with it being such a game changer when it comes to attacking and auditing Active Directory domains. Every organization running Active Directory [&#8230;]</p>
The post <a href="/2025/03/purple-teaming-ad-with-bloodhound-community-edition-ad-miner/">Purple Teaming AD with BloodHound CE & AD-Miner</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Home Lab Setup (2017)</title>
		<link>/2018/02/home-lab-setup/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Sun, 04 Feb 2018 15:51:15 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[blue]]></category>
		<category><![CDATA[Elastic]]></category>
		<category><![CDATA[ELK]]></category>
		<category><![CDATA[ESXi]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[FreeBSD]]></category>
		<category><![CDATA[Home Lab]]></category>
		<category><![CDATA[IDS]]></category>
		<category><![CDATA[IIS]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[nginx]]></category>
		<category><![CDATA[OPNsense]]></category>
		<category><![CDATA[pfSense]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[snort]]></category>
		<category><![CDATA[team]]></category>
		<category><![CDATA[VMWare]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=3508</guid>

					<description><![CDATA[<p>In this post and video I give a quick run down of my Home Lab &#8211; everything from the rack itself, to the hardware and the basics of what everything is being used for. I started this project towards the end of 2012 with a single Dell PowerEdge 2950 GII and was hoping to teach [&#8230;]</p>
The post <a href="/2018/02/home-lab-setup/">Home Lab Setup (2017)</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
	</channel>
</rss>
