paulveillard / cybersecurity-red-teamLinks
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Red Team (Offensive) in Cybersecurity.
☆96Updated 2 years ago
Alternatives and similar repositories for cybersecurity-red-team
Users that are interested in cybersecurity-red-team are comparing it to the libraries listed below
Sorting:
- A collection of red blue team staff☆47Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Red Team Guides☆140Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆76Updated 2 months ago
- Attack Surface Discovery Tool☆110Updated last year
- List of red team resources☆96Updated 7 years ago
- A compilation of important commands, files, and tools used in Pentesting☆51Updated 2 years ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆133Updated 3 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆91Updated 5 months ago
- ☆245Updated 3 years ago
- ☆65Updated 2 years ago
- ☆29Updated 4 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆77Updated 3 years ago
- ☆75Updated 4 years ago
- List of some cybersecurity conferences☆57Updated 2 months ago
- My public notes about offensive security☆164Updated last month
- ☆49Updated 5 years ago
- OWASP based Web Application Security Testing Checklist☆78Updated last year
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- This is a repository for network security tools and technologies.☆98Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- ☆138Updated 3 years ago
- List of Command&Control (C2) software☆45Updated 2 years ago
- Resources for AD penetration testing and security☆33Updated 3 years ago
- ☆31Updated 4 years ago
- Application Security pipelines☆51Updated 3 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- ☆22Updated 2 years ago