paulveillard / cybersecurity-red-teamLinks
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Red Team (Offensive) in Cybersecurity.
☆95Updated 2 years ago
Alternatives and similar repositories for cybersecurity-red-team
Users that are interested in cybersecurity-red-team are comparing it to the libraries listed below
Sorting:
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Red Team Guides☆139Updated last year
- Web Hacking and Red Teaming MindMap☆77Updated 3 weeks ago
- A collection of red blue team staff☆46Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- A compilation of important commands, files, and tools used in Pentesting☆51Updated 2 years ago
- Repository of cybersecurity mindmaps☆33Updated 2 years ago
- List of red team resources☆96Updated 7 years ago
- ☆75Updated 4 years ago
- Attack Surface Discovery Tool☆109Updated 11 months ago
- List of some cybersecurity conferences☆57Updated last week
- ☆29Updated 4 years ago
- ☆65Updated 2 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆86Updated 3 months ago
- My public notes about offensive security☆164Updated last year
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆123Updated 3 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆52Updated 3 years ago
- ☆137Updated 2 years ago
- ☆39Updated 2 years ago
- OWASP based Web Application Security Testing Checklist☆78Updated last year
- ☆234Updated 2 years ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆28Updated last year
- ☆98Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- List of Command&Control (C2) software☆42Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- This is a repository for network security tools and technologies.☆98Updated 2 years ago
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆168Updated last year
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆98Updated last month
- Cybersecurity Notes☆165Updated last year