# Red Team Infrastructure

* [HTTP Forwarders / Relays](https://hamcodes.gitbook.io/hackersnotes/offensive-security/red-team-infrastructure/http-forwarders-relays)
* [SMTP Forwarders / Relays](https://hamcodes.gitbook.io/hackersnotes/offensive-security/red-team-infrastructure/smtp-forwarders-relays)
* [Phishing with Modlishka Reverse HTTP Proxy](https://hamcodes.gitbook.io/hackersnotes/offensive-security/red-team-infrastructure/phishing-with-modlishka-reverse-http-proxy)
* [Automating Red Team Infrastructure with Terraform](https://hamcodes.gitbook.io/hackersnotes/offensive-security/red-team-infrastructure/automating-red-team-infrastructure-with-terraform)
* [Cobalt Strike 101](https://hamcodes.gitbook.io/hackersnotes/offensive-security/red-team-infrastructure/cobalt-strike-101)
* [Powershell Empire 101](https://hamcodes.gitbook.io/hackersnotes/offensive-security/red-team-infrastructure/powershell-empire-101)
* [Spiderfoot 101 with Kali using Docker](https://hamcodes.gitbook.io/hackersnotes/offensive-security/red-team-infrastructure/spiderfoot-101-with-kali-using-docker)
* [Abusing Trust Account$: Accessing Resources on a Trusted Domain from a Trusting Domain](https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/abusing-trust-accountusd-accessing-resources-on-a-trusted-domain-from-a-trusting-domain)
