Skip to content

A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Red Team in Cybersecurity.

License

Notifications You must be signed in to change notification settings

0x0nullian/cybersecurity-red-team

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Cybersecurity Red Team

A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Red Team in Cybersecurity.

What is a Red Team?

  • A red team consists of security professionals who act as adversaries to overcome cyber security controls. Red teams often consist of independent ethical hackers who evaluate system security in an objective manner.

  • They utilize all the available techniques (discussed below) to find weaknesses in people, processes, and technology to gain unauthorized access to assets. As a result of these simulated attacks, red teams make recommendations and plans on how to strengthen an organization’s security posture.

red

Red teams are offensive security professionals who are experts in attacking systems and breaking into defenses. Blue teams are *defensive security *professionals responsible for maintaining internal network defenses against all cyber attacks and threats.

Red teams simulate attacks against blue teams to test the effectiveness of the network’s security.

Table of Contents

Initial Access

Execution

Persistence

Privilege Escalation

User Account Control Bypass

Escalation

Defense Evasion

Credential Access

Discovery

Lateral Movement

Collection

Exfiltration

Command and Control

Domain Fronting

Connection Proxy

Web Services

Application Layer Protocol

Infrastructure

Embedded and Peripheral Devices Hacking

Misc

RedTeam Gadgets

Network Implants

Wifi Auditing

IoT

Software Defined Radio - SDR

Misc

Ebooks

Training ( Free )

Home Lab

Certification

License

MIT License & cc license

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

To the extent possible under law, Paul Veillard has waived all copyright and related or neighboring rights to this work. Just follow the guidelines. Thank you!

About

A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Red Team in Cybersecurity.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published