J0hnbX / RedTeam-ResourcesLinks
☆731Updated 3 years ago
Alternatives and similar repositories for RedTeam-Resources
Users that are interested in RedTeam-Resources are comparing it to the libraries listed below
Sorting:
- Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.☆568Updated 4 months ago
- Red Team Cheatsheet in constant expansion.☆1,237Updated last year
- List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting p…☆703Updated 9 months ago
- A Huge Learning Resources with Labs For Offensive Security Players☆1,001Updated 3 years ago
- Red Team Attack Lab for TTP testing & research☆579Updated 2 years ago
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,471Updated 2 weeks ago
- ☆883Updated 2 years ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆592Updated 2 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,816Updated last year
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆241Updated 4 years ago
- Offensive Security OSCP+, OSEP, OSWP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA, OSIR, OSTH Exam and Lab Reporting / Note-Taking Tool☆834Updated 2 weeks ago
- ☆748Updated 3 years ago
- A collection of CTF write-ups, pentesting topics, guides and notes. Notes compiled from multiple sources and my own lab research. Topics …☆573Updated last month
- This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machine…☆843Updated 3 years ago
- Vagrant VirtualBox environment for conducting an internal network penetration test☆933Updated 2 years ago
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆480Updated 5 months ago
- ☆348Updated 2 years ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,063Updated 4 years ago
- ☆619Updated last week
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆738Updated 2 months ago
- #cheat sheet for OSCP☆290Updated 5 years ago
- ☆433Updated 3 years ago
- ☆1,119Updated 2 years ago
- Collection of Pentest Notes and Cheatsheets☆384Updated 4 months ago
- Tools & Interesting Things for RedTeam Ops☆2,223Updated 4 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,926Updated 2 years ago
- ☆439Updated 3 years ago
- ☆1,590Updated 3 years ago
- ☆245Updated 3 years ago
- Script for generating revshells☆475Updated last year