Complete collection of security commands for CTF competitions and hands-on penetration testing.
- 800+ Security Commands organized by category and team type
- Interactive Web GUI with tab-based navigation
- RED/BLUE/PURPLE Team Operations - Offensive, Defensive, and Hybrid
- Complete Documentation for GitHub and reference
- Production Ready - Deploy immediately
- RED Team (Offensive) - Penetration testing and exploitation commands
- BLUE Team (Defensive) - Security monitoring and defense commands
- PURPLE Team (Hybrid) - Both offensive and defensive capabilities
AlEnezi-CTF-Notes/
├── README.md # Project overview
├── COMMANDS.md # Full command reference
├── GETTING-STARTED.md # Quick start guide
├── CTF-GUIDE.md # CTF competition guide
├── HANDS-ON.md # Practical exercises
├── WINDOWS-GUIDE.md # Windows exploitation
├── LINUX-GUIDE.md # Linux exploitation
├── NETWORK-GUIDE.md # Network operations
├── WEB-TESTING.md # Web application testing
├── DEFENSE-GUIDE.md # Security defense
├── LICENSE.md # Legal notice
└── docs/
├── index.html # Interactive web GUI
├── app.js # JavaScript application
└── [GitHub Pages ready]
- Extract ZIP file
- Open
docs/index.htmlin web browser - Click category tabs to browse
- Click "Copy" to copy commands
- Paste into terminal
- Domain reconnaissance
- DNS enumeration
- Personnel discovery
- Social media search
- RED: Persistence, escalation, exploitation
- BLUE: Detection, forensics, hardening
- PURPLE: Detection + exploitation
- RED: Privilege escalation, persistence
- BLUE: System hardening, auditing
- PURPLE: Detection + exploitation
- Host discovery
- Port scanning
- Network mapping
- Protocol analysis
- SQL injection
- XSS attacks
- File upload exploits
- API testing
- Metasploit
- Payload generation
- Hash cracking
- Brute force tools
- IDS/IPS systems
- SIEM tools
- Firewall configuration
- File integrity monitoring
Each category includes:
- Command syntax and options
- Practical usage examples
- Expected output
- Defense countermeasures
This suite includes everything needed for CTF competitions:
- Reconnaissance commands
- Exploitation techniques
- Post-exploitation
- Log cleaning & OPSEC
Al Enezi (@SiteQ8)
- GitHub: https://github.com/SiteQ8
- LinkedIn: https://www.linkedin.com/in/alenizi/
- Cybersecurity Professional
- CTF Competitor
For authorized security testing and educational purposes only.
See LICENSE.md for details.