paulveillard / cybersecurity-red-teamLinks
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Red Team (Offensive) in Cybersecurity.
☆96Updated 2 years ago
Alternatives and similar repositories for cybersecurity-red-team
Users that are interested in cybersecurity-red-team are comparing it to the libraries listed below
Sorting:
- Red Team Guides☆139Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Web Hacking and Red Teaming MindMap☆77Updated 2 months ago
- A collection of red blue team staff☆46Updated 2 years ago
- Attack Surface Discovery Tool☆110Updated last year
- ☆39Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Repository of cybersecurity mindmaps☆33Updated 2 years ago
- List of red team resources☆97Updated 7 years ago
- ☆75Updated 4 years ago
- ☆138Updated 2 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- ☆240Updated 2 years ago
- ☆106Updated 4 years ago
- List of Command&Control (C2) software☆44Updated 2 years ago
- List of some cybersecurity conferences☆57Updated last month
- Application Security pipelines☆51Updated 3 years ago
- This is a repository for network security tools and technologies.☆98Updated 2 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆90Updated 4 months ago
- ☆31Updated 4 years ago
- My public notes about offensive security☆164Updated last month
- Resources for AD penetration testing and security☆32Updated 3 years ago
- ☆48Updated 4 years ago
- A compilation of important commands, files, and tools used in Pentesting☆52Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- ☆65Updated 2 years ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆128Updated 3 years ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆77Updated 3 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Updated last year
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆44Updated 2 years ago