Black & White Path
Black & White Path
Apr 11, 2026 · Information Security

Inside the Exposed TheGentlemen Ransomware Toolkit on Proton66

In March 2026 Hunt.io researchers uncovered an open directory on the Russian bullet‑proof host Proton66 that contains the full TheGentlemen ransomware toolkit, complete with Mimikatz credential logs, ngrok tokens, and 21 MITRE ATT&CK techniques, providing a detailed view of the attackers' reconnaissance, privilege‑escalation, defense‑evasion, credential‑access, persistence, and encryption‑preparation stages.

MITRE ATT&CKMimikatzProton66
0 likes · 22 min read
Inside the Exposed TheGentlemen Ransomware Toolkit on Proton66
Black & White Path
Black & White Path
Mar 17, 2026 · Information Security

Red Team Playbook: From External Breach to Internal Network Domination

This guide walks through the full red‑team workflow—from reconnaissance and initial access through defense evasion, credential theft, lateral movement, and operational security—detailing concrete tools, commands, and techniques for compromising both external and internal networks.

OPSECOSINTcredential dumping
0 likes · 10 min read
Red Team Playbook: From External Breach to Internal Network Domination
Black & White Path
Black & White Path
Feb 23, 2026 · Information Security

Stop Random Brute‑Force: The Complete Guide to Internal Network Credential Collection

This article provides a step‑by‑step technical guide for gathering internal network credentials—including Windows memory dumping with Mimikatz, Linux /etc shadow extraction, network service scanning with SharpScan, Kerberoasting attacks, password‑spraying tactics, and defensive recommendations—targeted at authorized penetration‑testing scenarios.

KerberoastingMimikatzPenetration Testing
0 likes · 24 min read
Stop Random Brute‑Force: The Complete Guide to Internal Network Credential Collection