Skip to content

cyberTwitty/RedTeamFromScratch

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

30 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

🧨 RedTeamFromScratch

Welcome to my red team ramp-up β€” part study guide, part simulation, part personal lab notebook.

I'm a Navy veteran pivoting into offensive security with zero formal tech background, just grit, caffeine, and curiosity. This repo tracks my hands-on learning across core red teaming concepts using free tools, public labs, and real-world exploit writeups.

πŸ” What's in this repo?

Each day focuses on a specific vulnerability, tool, or adversarial technique. For each one, I break down:

  • πŸ““ Technical notes and concepts
  • πŸ§ͺ Labs and walk-throughs
  • πŸ’£ Payloads and testing strategies
  • πŸ›‘οΈ Mitigations and defense notes
  • πŸ“š Real-world examples and CVEs
  • πŸ” Reflections on what tripped me up or clicked

βœ… Sample Topics:

  • SSRF
  • XSS
  • LFI/RFI
  • SQLi
  • IDOR
  • Authentication bypasses
  • Enumeration tooling (FFUF, Nmap, Gobuster, etc.)

πŸ—‚οΈ Repo Structure

RedTeamFromScratch/
β”œβ”€β”€ Day01_SSRF/
β”‚   β”œβ”€β”€ room_notes.md  # Concepts, tools, and example payloads
β”‚   β”œβ”€β”€ real_world_scenario.md  # Breach summaries or public CVEs
β”‚   β”œβ”€β”€ mitigations.md  # How defenders detect and block it
β”‚   └── reflection.md  # What I learned, struggled with, or want to revisit
└── Resources  # Tools, cheatsheets, and general references

βš™οΈ My Setup

  • Kali Linux (VM)
  • Burp Suite Community
  • Obsidian for daily logs + longform notes
  • GitHub for version control + portfolio building

πŸ’‘ Why I’m Doing This

I got tired of waiting for the β€œright” way to break into cyber. So I started building my own.

This is part bootcamp, part accountability, part message in a bottle to other late bloomers, career switchers, and curious weirdos learning in public.


Disclaimer: This repo contains only legally accessible research, public lab work, and self-hosted testing environments. No unauthorized access or live target exploitation is performed.

About

My Offensive Security Journey

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors