https://www.cybereason.com/blog/research/powerless-trojan-iranian-apt-phosphorus-adds-new-powershell-backdoor-for-espionage

https://github.com/CyberSecurityUP/Awesome-Red-Team-Operations

https://github.com/CyberSecurityUP/Red-Team-Management

https://medium.com/@agent_maximus/zero-to-domain-admin-bypassing-nac-and-getting-the-goods-7e13f03d6dc

https://www.blackhat.com/docs/eu-17/materials/eu-17-Thompson-Red-Team-Techniques-For-Evading-Bypassing-And-Disabling-MS-Advanced-Threat-Protection-And-Advanced-Threat-Analytics.pdf

https://www.레드팀.com/basic-redteam/overview

https://takudaddy.tistory.com/439

https://www.atomicredteam.io/atomic-red-team ← 신기함

https://github.com/Orange-Cyberdefense/GOAD?tab=readme-ov-file ← AD 훈련

https://pentesterlab.com/exercises ← 웹해킹

https://blog.sunggwanchoi.com/redteam-hiring-criteria/

https://github.com/blackorbird/APT_REPORT/tree/master APT 보고서들