Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/we1h0/redteam-tips

关于红队方面的学习资料
https://github.com/we1h0/redteam-tips

Last synced: about 1 month ago
JSON representation

关于红队方面的学习资料

Awesome Lists containing this project

README

        

# RedTeam-Tips

> 正在学习红队评估,特开此坑,欢迎各位在issues提交好的文献,持续更新,star支持一下,协助修正完善。
> 资料均来自网上收集,如未标明作者有侵权行为,请及时联系h4x0er[at]secbug.org进行删除或修改。
> 喜欢请点 Star,如果不打算贡献,千万别 Fork,Fork后的版本不会自动同步更新最新的版本,你不会享受到最新版本给你带来的快乐和惊喜。

[域安全浅析-基础概念及历史漏洞分析](https://mp.weixin.qq.com/s/R1J6UFKw_m8PVuI_pcUMkA)

[内网渗透TIPS](https://github.com/Ridter/Intranet_Penetration_Tips)

[域渗透初探](https://zhuanlan.zhihu.com/p/32074351)

[高持续渗透系列课程](https://micropoor.blogspot.com/2019/01/php8.html)

[高级攻防 100 课](https://github.com/Micropoor/Micro8)

[100 课等经典攻防教材](https://github.com/Ma3k4H3d/Papers)

[红蓝方攻防手册](https://github.com/infosecn1nja/AD-Attack-Defense)

[优秀红队资源列表](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming)

[红队标准渗透测试流程+常用命令](https://github.com/foobarto/redteam-notebook)

[mitre 机构对横向移动的总结](https://attack.mitre.org/wiki/Lateral_Movement/)

[彻底理解 Windows 认证 - 议题解读](https://payloads.online/archivers/2018-11-30/1)

[内网大牛的学习历程](https://github.com/klionsec/klionsec.github.io)

[从零开始内网渗透学习](https://github.com/l3m0n/pentest_study)

[仿真靶场搭建:个人版PENTESTIT](https://www.freebuf.com/sectool/195632.html)

[Exchange Privilege Elevation](https://evi1cg.me/archives/Exchange_Privilege_Elevation.html)

[三层网络靶场搭建&MSF内网渗透](https://www.anquanke.com/post/id/170649)

[域渗透总结](https://mp.weixin.qq.com/s?__biz=Mzg3NzE5OTA5NQ==&mid=2247483807&idx=1&sn=59be50aa5cc735f055db596269a857ce&chksm=cf27ea07f850631)

[【域渗透】 SPN 扫描利用](https://rcoil.me/2019/06/%E3%80%90%E5%9F%9F%E6%B8%97%E9%80%8F%E3%80%91%20SPN%20%E6%89%AB%E6%8F%8F%E5%88%A9%E7%94%A8/)

[域渗透——Pass The Hash的实现](https://xz.aliyun.com/t/1802/)

[APT攻击技术学习指南](https://github.com/Yeti-791/APT-Guide)

[APT事件分析报告汇总(密码P3mh)](https://eyun.baidu.com/enterprise/share/init?cid=8272253626392623208&uk=2882212757&sid=201903245688803144)

[威胁猎人APT资料](https://github.com/blackorbird/APT_REPORT)

[OSINT开源情报与侦察工具](https://start.me/p/GE7JQb/osint)

[漫谈攻击链:从WebShell到域控的奇妙之旅](https://www.freebuf.com/articles/network/172578.html)

[一次完整的从webshell到域控的探索之路](https://mp.weixin.qq.com/s/Yv6dDZBYTg2BbmnL_Vbf8w)

[内网渗透(实验)之域渗透深入弹shell开3389拿域控](https://mp.weixin.qq.com/s/9-6F3JDlxdC1CkpzbC0Ebw)

[从WebShell到域控实战详解](https://www.heibai.org/post/1533.html)

[内网渗透之-域渗透基础](http://www.91ri.org/10154.html)

[ 从Webshell到System再到域控]( https://zhuanlan.zhihu.com/p/38813123 )

[ Security-PPT系列安全书籍 ]( https://github.com/FeeiCN/Security-PPT/tree/master/security )

[ 内网渗透之PTH&PTT&PTK ]( https://www.cnblogs.com/bmjoker/p/10355979.html )

[ 从0开始你的域渗透之旅 ]( https://github.com/crazywa1ker/DarthSidious-Chinese )

[ Active-Directory-Pentest-Notes ]( https://github.com/uknowsec/Active-Directory-Pentest-Notes )

[DGA域名的今生前世:缘起、检测、与发展]( https://mp.weixin.qq.com/s/xbf0Qbppk8R0nx89Pb4YTg )

[MITRE | ATT&CK 中文站](https://huntingday.github.io/)

[MITRE | ATT&CK](https://attack.mitre.org/)

[红队专家工具包](https://github.com/infosecn1nja/Red-Teaming-Toolkit)

[红队测试从0到1 - PART 1](https://xz.aliyun.com/t/2742)

[红队测试从0到1 - PART 2](https://xz.aliyun.com/t/2764)

[渗透利器Cobalt Strike - 第1篇 功能及使用](https://xz.aliyun.com/t/3975)

[渗透利器Cobalt Strike - 第2篇 APT级的全面免杀与企业纵深防御体系的对抗](https://xz.aliyun.com/t/4191)

[红队基础建设:隐藏你的C2 server](https://xz.aliyun.com/t/4509)

[【译】一套可用于强化红队基础设施的补充资源](https://xz.aliyun.com/t/150)

[一次红队之旅](https://xz.aliyun.com/t/2389)

[要想加入红队,需要做好哪些准备?](https://xz.aliyun.com/t/4952)

[关于后渗透当中Windows系统自带签名文件的白利用](https://lolbas-project.github.io/)

[ATT&CK手册(修改版).pdf](https://github.com/Dm2333/ATTCK-PenTester-Book)

[红队人员作战手册](https://github.com/klionsec/RedTeamer)

[云上攻防:RED TEAMING FOR CLOUD](http://avfisher.win/archives/1175)

[2020攻防演练弹药库-您有主机上线请注意](https://blog.riskivy.com/2020%E6%94%BB%E9%98%B2%E6%BC%94%E7%BB%83%E5%BC%B9%E8%8D%AF%E5%BA%93-%E6%82%A8%E6%9C%89%E4%B8%BB%E6%9C%BA%E4%B8%8A%E7%BA%BF%E8%AF%B7%E6%B3%A8%E6%84%8F/)

[2021 攻防演练中需要关注的重点漏洞
](https://blog.riskivy.com/2021-%e6%94%bb%e9%98%b2%e6%bc%94%e7%bb%83%e4%b8%ad%e9%9c%80%e8%a6%81%e5%85%b3%e6%b3%a8%e7%9a%84%e9%87%8d%e7%82%b9%e6%bc%8f%e6%b4%9e/)

[远控免杀系列文章及配套工具](https://github.com/TideSec/BypassAntiVirus)

[Pentest-and-Development-Tips](https://github.com/3gstudent/Pentest-and-Development-Tips)

[云渗透思路](https://www.moonsec.com/archives/1098)

[云安全知识库](https://cloudsec.huoxian.cn/)

[云安全入门](https://lzcloudsecurity.gitbook.io/yun-an-quan-gong-fang-ru-men/)

后期计划重新细分下相关资料标签