Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/we1h0/redteam-tips
关于红队方面的学习资料
https://github.com/we1h0/redteam-tips
Last synced: about 1 month ago
JSON representation
关于红队方面的学习资料
- Host: GitHub
- URL: https://github.com/we1h0/redteam-tips
- Owner: we1h0
- Created: 2019-10-22T06:36:29.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2024-01-03T03:51:51.000Z (11 months ago)
- Last Synced: 2024-10-29T16:58:13.217Z (about 1 month ago)
- Homepage:
- Size: 16.6 KB
- Stars: 1,179
- Watchers: 24
- Forks: 182
- Open Issues: 0
-
Metadata Files:
- Readme: readme.md
Awesome Lists containing this project
- awesome-hacking-lists - we1h0/redteam-tips - 关于红队方面的学习资料 (Others)
README
# RedTeam-Tips
> 正在学习红队评估,特开此坑,欢迎各位在issues提交好的文献,持续更新,star支持一下,协助修正完善。
> 资料均来自网上收集,如未标明作者有侵权行为,请及时联系h4x0er[at]secbug.org进行删除或修改。
> 喜欢请点 Star,如果不打算贡献,千万别 Fork,Fork后的版本不会自动同步更新最新的版本,你不会享受到最新版本给你带来的快乐和惊喜。[域安全浅析-基础概念及历史漏洞分析](https://mp.weixin.qq.com/s/R1J6UFKw_m8PVuI_pcUMkA)
[内网渗透TIPS](https://github.com/Ridter/Intranet_Penetration_Tips)
[域渗透初探](https://zhuanlan.zhihu.com/p/32074351)
[高持续渗透系列课程](https://micropoor.blogspot.com/2019/01/php8.html)
[高级攻防 100 课](https://github.com/Micropoor/Micro8)
[100 课等经典攻防教材](https://github.com/Ma3k4H3d/Papers)
[红蓝方攻防手册](https://github.com/infosecn1nja/AD-Attack-Defense)
[优秀红队资源列表](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming)
[红队标准渗透测试流程+常用命令](https://github.com/foobarto/redteam-notebook)
[mitre 机构对横向移动的总结](https://attack.mitre.org/wiki/Lateral_Movement/)
[彻底理解 Windows 认证 - 议题解读](https://payloads.online/archivers/2018-11-30/1)
[内网大牛的学习历程](https://github.com/klionsec/klionsec.github.io)
[从零开始内网渗透学习](https://github.com/l3m0n/pentest_study)
[仿真靶场搭建:个人版PENTESTIT](https://www.freebuf.com/sectool/195632.html)
[Exchange Privilege Elevation](https://evi1cg.me/archives/Exchange_Privilege_Elevation.html)
[三层网络靶场搭建&MSF内网渗透](https://www.anquanke.com/post/id/170649)
[域渗透总结](https://mp.weixin.qq.com/s?__biz=Mzg3NzE5OTA5NQ==&mid=2247483807&idx=1&sn=59be50aa5cc735f055db596269a857ce&chksm=cf27ea07f850631)
[【域渗透】 SPN 扫描利用](https://rcoil.me/2019/06/%E3%80%90%E5%9F%9F%E6%B8%97%E9%80%8F%E3%80%91%20SPN%20%E6%89%AB%E6%8F%8F%E5%88%A9%E7%94%A8/)
[域渗透——Pass The Hash的实现](https://xz.aliyun.com/t/1802/)
[APT攻击技术学习指南](https://github.com/Yeti-791/APT-Guide)
[APT事件分析报告汇总(密码P3mh)](https://eyun.baidu.com/enterprise/share/init?cid=8272253626392623208&uk=2882212757&sid=201903245688803144)
[威胁猎人APT资料](https://github.com/blackorbird/APT_REPORT)
[OSINT开源情报与侦察工具](https://start.me/p/GE7JQb/osint)
[漫谈攻击链:从WebShell到域控的奇妙之旅](https://www.freebuf.com/articles/network/172578.html)
[一次完整的从webshell到域控的探索之路](https://mp.weixin.qq.com/s/Yv6dDZBYTg2BbmnL_Vbf8w)
[内网渗透(实验)之域渗透深入弹shell开3389拿域控](https://mp.weixin.qq.com/s/9-6F3JDlxdC1CkpzbC0Ebw)
[从WebShell到域控实战详解](https://www.heibai.org/post/1533.html)
[内网渗透之-域渗透基础](http://www.91ri.org/10154.html)
[ 从Webshell到System再到域控]( https://zhuanlan.zhihu.com/p/38813123 )
[ Security-PPT系列安全书籍 ]( https://github.com/FeeiCN/Security-PPT/tree/master/security )
[ 内网渗透之PTH&PTT&PTK ]( https://www.cnblogs.com/bmjoker/p/10355979.html )
[ 从0开始你的域渗透之旅 ]( https://github.com/crazywa1ker/DarthSidious-Chinese )
[ Active-Directory-Pentest-Notes ]( https://github.com/uknowsec/Active-Directory-Pentest-Notes )
[DGA域名的今生前世:缘起、检测、与发展]( https://mp.weixin.qq.com/s/xbf0Qbppk8R0nx89Pb4YTg )
[MITRE | ATT&CK 中文站](https://huntingday.github.io/)
[MITRE | ATT&CK](https://attack.mitre.org/)
[红队专家工具包](https://github.com/infosecn1nja/Red-Teaming-Toolkit)
[红队测试从0到1 - PART 1](https://xz.aliyun.com/t/2742)
[红队测试从0到1 - PART 2](https://xz.aliyun.com/t/2764)
[渗透利器Cobalt Strike - 第1篇 功能及使用](https://xz.aliyun.com/t/3975)
[渗透利器Cobalt Strike - 第2篇 APT级的全面免杀与企业纵深防御体系的对抗](https://xz.aliyun.com/t/4191)
[红队基础建设:隐藏你的C2 server](https://xz.aliyun.com/t/4509)
[【译】一套可用于强化红队基础设施的补充资源](https://xz.aliyun.com/t/150)
[一次红队之旅](https://xz.aliyun.com/t/2389)
[要想加入红队,需要做好哪些准备?](https://xz.aliyun.com/t/4952)
[关于后渗透当中Windows系统自带签名文件的白利用](https://lolbas-project.github.io/)
[ATT&CK手册(修改版).pdf](https://github.com/Dm2333/ATTCK-PenTester-Book)
[红队人员作战手册](https://github.com/klionsec/RedTeamer)
[云上攻防:RED TEAMING FOR CLOUD](http://avfisher.win/archives/1175)
[2020攻防演练弹药库-您有主机上线请注意](https://blog.riskivy.com/2020%E6%94%BB%E9%98%B2%E6%BC%94%E7%BB%83%E5%BC%B9%E8%8D%AF%E5%BA%93-%E6%82%A8%E6%9C%89%E4%B8%BB%E6%9C%BA%E4%B8%8A%E7%BA%BF%E8%AF%B7%E6%B3%A8%E6%84%8F/)
[2021 攻防演练中需要关注的重点漏洞
](https://blog.riskivy.com/2021-%e6%94%bb%e9%98%b2%e6%bc%94%e7%bb%83%e4%b8%ad%e9%9c%80%e8%a6%81%e5%85%b3%e6%b3%a8%e7%9a%84%e9%87%8d%e7%82%b9%e6%bc%8f%e6%b4%9e/)[远控免杀系列文章及配套工具](https://github.com/TideSec/BypassAntiVirus)
[Pentest-and-Development-Tips](https://github.com/3gstudent/Pentest-and-Development-Tips)
[云渗透思路](https://www.moonsec.com/archives/1098)
[云安全知识库](https://cloudsec.huoxian.cn/)
[云安全入门](https://lzcloudsecurity.gitbook.io/yun-an-quan-gong-fang-ru-men/)
后期计划重新细分下相关资料标签