Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/nairuzabulhul/r3d-buck3t
Penetration Testing, Vulnerability Assessment and Red Team Learning
https://github.com/nairuzabulhul/r3d-buck3t
activedirectory hacking infosec linux online-learning oscp penetration-testing pentesting pesntesting pluralsight python redteam security
Last synced: about 11 hours ago
JSON representation
Penetration Testing, Vulnerability Assessment and Red Team Learning
- Host: GitHub
- URL: https://github.com/nairuzabulhul/r3d-buck3t
- Owner: nairuzabulhul
- Created: 2017-08-24T00:10:13.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2025-01-25T04:11:55.000Z (8 days ago)
- Last Synced: 2025-01-26T00:08:51.733Z (8 days ago)
- Topics: activedirectory, hacking, infosec, linux, online-learning, oscp, penetration-testing, pentesting, pesntesting, pluralsight, python, redteam, security
- Language: SCSS
- Homepage: https://nairuzabulhul.github.io/R3d-Buck3T
- Size: 1.99 MB
- Stars: 133
- Watchers: 12
- Forks: 43
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
🔴 Official Blog on [R3d-Buck3t](https://medium.com/r3d-buck3t)
### Lastest posts
- [Payload Delivery with Azure Static Website and IPFS Dropper](https://medium.com/r3d-buck3t/payload-delivery-with-azure-static-website-and-ipfs-dropper-3de6a09ad1f3?source=rss----25eaa8551178---4)
- [Configure Fireprox for IP Rotation using AWS API Gateway](https://medium.com/r3d-buck3t/configure-fireprox-for-ip-rotation-using-aws-api-gateway-b37ff3523e36?source=rss----25eaa8551178---4)
- [Adding Certificates to Postman & Burp Suite for API Testing](https://medium.com/r3d-buck3t/adding-certificates-to-postman-burp-suite-for-api-testing-06339a6d072a?source=rss----25eaa8551178---4)
- [Red Teaming in Cloud: Leverage Azure FrontDoor CDN for C2 Redirectors](https://medium.com/r3d-buck3t/red-teaming-in-cloud-leverage-azure-frontdoor-cdn-for-c2-redirectors-79dd9ca98178?source=rss----25eaa8551178---4)
- [Abusing Dynamic Groups in AzureAD [Part 1]](https://medium.com/r3d-buck3t/abusing-dynamic-groups-in-azuread-part-1-ff12e328c8c0?source=rss----25eaa8551178---4)
- [Red Teaming in the Cloud: Installing Mythic C2 on Azure VM](https://medium.com/r3d-buck3t/red-teaming-in-the-cloud-installing-mythic-c2-on-azure-vm-35ef762e61b6?source=rss----25eaa8551178---4)
- [Red Teaming in the Cloud: Deploying Azure VMs for C2 Infrastructure](https://medium.com/r3d-buck3t/red-teaming-in-the-cloud-deploying-azure-vms-for-c2-infrastructure-c4819d843b72?source=rss----25eaa8551178---4)
- [Virtual Host Enumeration for Uncovering Hidden Subdomains](https://medium.com/r3d-buck3t/virtual-host-enumeration-for-uncovering-hidden-subdomains-e800625c2b8f?source=rss----25eaa8551178---4)
- [CrackMapExec in Action: Enumerating Windows Networks (Part 2)](https://medium.com/r3d-buck3t/crackmapexec-in-action-enumerating-windows-networks-part-2-c61dfb7cd88e?source=rss----25eaa8551178---4)
- [CrackMapExec in Action: Enumerating Windows Networks (Part 1)](https://medium.com/r3d-buck3t/crackmapexec-in-action-enumerating-windows-networks-part-1-3a6a7e5644e9?source=rss----25eaa8551178---4)Â
## Pentestinf/Red Team Wiki Index
This repo is a collection of tools and commands for pentesting and red teaming assessments🔎 [View the Wiki](https://nairuzabulhul.github.io/R3d-Buck3T/)
+ Web Application Security
+ Window & Active Directory
+ Cloud Security
+ Netowrk Security
+ Wireless Security
+ Vulnerability Research
+ Misc
+ Resources
+ Trainingupdating soon ....
|[![Web Application Security](https://raw.githubusercontent.com/nairuzabulhul/R3d-Buck3T/master/images/Hnet.com-image%20(1).jpg)](https://github.com/nairuzabulhul/R3d-Buck3T/blob/master/Web%20Application%20Security/Web%20Application%20Security.md)|[![Network Pentesting](https://raw.githubusercontent.com/nairuzabulhul/R3d-Buck3T/master/images/Hnet.com-image.jpg)](https://example")|[![Active Directory](https://raw.githubusercontent.com/nairuzabulhul/R3d-Buck3T/master/images/Hnet.com-image%20(2).jpg)](https://r3dbuck3t.notion.site/Windows-Active-Directory-Pentesting-e8b133fb1342403aabde337b82f66fbd "Active Directory")
|:--:|:--:|:--:|
|Web Application Security| Network Pentesting | Active Directory||[![Windows](https://raw.githubusercontent.com/nairuzabulhul/R3d-Buck3T/master/images/Hnet.com-image%20(3).jpg)](https://example)|[![Linux](https://raw.githubusercontent.com/nairuzabulhul/R3d-Buck3T/master/images/Hnet.com-image%20(6).jpg)](https://example")|[![Cloud Security](https://raw.githubusercontent.com/nairuzabulhul/R3d-Buck3T/master/images/Hnet.com-image%20(5).jpg)](https://example")
|:--:|:--:|:--:|
|Windows | Linux | Cloud Security||[![Wireless Security](https://raw.githubusercontent.com/nairuzabulhul/R3d-Buck3T/master/images/Hnet.com-image%20(7).jpg)](https://example")|[![Vulnerability Research](https://raw.githubusercontent.com/nairuzabulhul/R3d-Buck3T/master/images/Hnet.com-image.jpg)]("https://example")|[![Miscd](https://raw.githubusercontent.com/nairuzabulhul/R3d-Buck3T/master/images/Hnet.com-image.jpg)](https://example")
|:--:|:--:|:--:|
| Wireless | Vulnerability Research | Misc|