paulveillard / cybersecurity-red-teamLinks
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Red Team (Offensive) in Cybersecurity.
☆93Updated 2 years ago
Alternatives and similar repositories for cybersecurity-red-team
Users that are interested in cybersecurity-red-team are comparing it to the libraries listed below
Sorting:
- Red Team Guides☆139Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- A collection of red blue team staff☆46Updated 2 years ago
- A compilation of important commands, files, and tools used in Pentesting☆52Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆76Updated 2 years ago
- List of red team resources☆95Updated 7 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Attack Surface Discovery Tool☆108Updated 10 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆82Updated 2 months ago
- My public notes about offensive security☆162Updated last year
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆168Updated last year
- Repository of cybersecurity mindmaps☆33Updated 2 years ago
- ☆230Updated 2 years ago
- ☆65Updated 2 years ago
- List of Command&Control (C2) software☆42Updated 2 years ago
- Resources for AD penetration testing and security☆32Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- ☆136Updated 2 years ago
- ☆29Updated 4 years ago
- ☆75Updated 3 years ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆122Updated 3 years ago
- blue team, red team stuff. All things cyber ;)☆78Updated 2 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 3 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆126Updated last year
- This is a repository for network security tools and technologies.☆98Updated 2 years ago
- Scripts and piece of codes used for Active Directory configuration☆84Updated 2 years ago