This project focuses on various attacks/defense scenarios to assess the security posture of systems and networks. The tests are organized into different categories, each targeting specific areas of security.
Explore techniques and tools for assessing the security of websites and web applications.
Explore vulnerabilities and exploits related to wireless networks and Wi-Fi security.
Discover and test methods for compromising computer systems and endpoints.
Learn about techniques used by attackers on mobile phones & their tactics.
Investigate and simulate attacks targeting social media platforms and user accounts.
- Navigate to the specific attack category you're interested in.
- Explore the detailed documentation and tools available for each type of attack.
- Follow ethical guidelines and use this information responsibly.
If you have additional red teaming techniques, tools, or improvements to existing content, feel free to contribute! Follow these steps:
- Fork the repository.
- Create a new branch for your changes.
- Make your modifications.
- Submit a pull request with a clear description of your changes.
OP3N1T-ATTACK is intended for educational and ethical purposes only. Use the information and tools responsibly and adhere to legal and ethical standards. The authors are not responsible for any misuse or damage caused by the content of this repository.
├───OP3N1T-ATTACK
|
├───ATTACKS_REDTEAM
| ├───WEBSITE_ATTACK
| ├───WIFI_ATTACK
| ├───COMPUTER_ATTACK
| ├───PHONE_ATTACK
| └───SOCIAL_MEDIA_ATTACK
|
├───DEFENCE_BLUETEAM
| ├───WEBSITE_ATTACK
| ├───WIFI_ATTACK
| ├───COMPUTER_ATTACK
| ├───PHONE_ATTACK
| └───SOCIAL_MEDIA_ATTACK
|
└───FILES
├───Google Dorks
└───WORDLISTS
├───dir
├───dns
├───files
├───fuzz
├───SecListsCurated
├───technology
└───Uploads