
Welcome to DELLOS Blog, a dedicated knowledge hub focused on Cloud Pentesting, Red Teaming, adversary simulation, and modern offensive security operations. This platform is designed to bridge the gap between theory and execution, delivering technically grounded, experience-driven content that reflects real-world engagements and contemporary threat landscapes.
At DELLOS, we go beyond high-level discussions. Our content emphasizes methodology, tradecraft, and operational discipline across cloud-native and hybrid environments. You will find structured walkthroughs covering Azure, AWS, and multi-cloud attack paths; identity-centric attack techniques targeting Entra ID / Azure AD; privilege escalation scenarios; lateral movement in cloud control planes; and OPSEC-aware tooling strategies. Each topic is presented with a practical lens—highlighting both offensive mechanics and defensive implications.
We also explore adversary simulation frameworks, detection evasion concepts, infrastructure design for red team operations, and post-exploitation decision-making within enterprise-grade environments. Where relevant, we analyze telemetry, logging artifacts, and mitigation strategies to ensure readers understand not only how attacks are executed, but how they are detected and prevented.
Whether you are a security consultant refining your cloud tradecraft, a blue team engineer seeking to understand offensive perspectives, or a practitioner preparing for advanced security assessments, DELLOS serves as a structured, technically rigorous resource. Our objective is to elevate operational maturity—helping professionals design, execute, and defend against sophisticated attacks in complex cloud ecosystems.
Explore, experiment responsibly, and continuously sharpen your expertise as we dissect the evolving landscape of cloud security and adversarial operations.
Disclaimer: Please note that the content shared on this blog represents personal notes, opinions, and insights. While I strive to provide accurate and up-to-date information, readers are encouraged to conduct their own research and consult with professionals before implementing any security measures or strategies discussed herein.