List of useful website for Red Team - ties2/Red-Team GitHub Wiki
Hack The Box (https://www.hackthebox.eu/) - A platform for practicing penetration testing skills in a safe and legal environment.
VulnHub (https://www.vulnhub.com/) - A platform for downloading vulnerable virtual machines to practice penetration testing.
Exploit-DB (https://www.exploit-db.com/) - A database of known exploits and vulnerabilities.
Metasploit (https://www.metasploit.com/) - A tool for testing and exploiting vulnerabilities.
Nmap (https://nmap.org/) - A tool for network exploration and security auditing.
Wireshark (https://www.wireshark.org/) - A tool for network protocol analysis.
The Social-Engineer Toolkit (https://github.com/trustedsec/social-engineer-toolkit/) - A tool for creating and executing social engineering attacks.
John the Ripper (https://www.openwall.com/john/) - A tool for cracking passwords.
Hydra (https://github.com/vanhauser-thc/thc-hydra/) - A tool for brute-forcing passwords.
Burp Suite (https://portswigger.net/burp/) - A web application testing tool that can be used to intercept, modify, and replay web traffic.
OWASP (https://owasp.org/) - A community dedicated to improving software security.
PentesterLab (https://pentesterlab.com/) - A platform for learning web penetration testing skills.
SANS (https://www.sans.org/) - A cybersecurity training and certification organization.
DarkReading (https://www.darkreading.com/) - A news and analysis site for cybersecurity professionals.
KrebsOnSecurity (https://krebsonsecurity.com/) - A blog by Brian Krebs that covers cybersecurity news and investigations.
DEF CON (https://www.defcon.org/) - A well-known hacker conference that features talks, workshops, and competitions.
Black Hat (https://www.blackhat.com/) - A leading cybersecurity conference that features training sessions and talks.
Hack Forums (https://hackforums.net/) - A forum for discussing hacking and cybersecurity.
The Hacker News (https://thehackernews.com/) - A news site that covers cybersecurity, hacking, and technology.
GitHub (https://github.com/) - A platform for hosting and sharing code, including tools and scripts for Red Teaming.
Cobalt Strike (https://www.cobaltstrike.com/) - A commercial, advanced, and multifunctional post-exploitation tool. It provides a range of features for red teaming and penetration testing, including command-and-control infrastructure, targeted attacks, and advanced payloads.
Empire (https://github.com/EmpireProject/Empire) - A post-exploitation framework that allows you to run PowerShell agents and modules. It provides a range of features for red teaming, including lateral movement, privilege escalation, and data exfiltration.
BloodHound (https://bloodhound.readthedocs.io/) - A tool for mapping and analyzing active directory environments. It provides a range of features for red teaming and penetration testing, including identifying weak points in the domain infrastructure, finding privileged users, and planning attack paths.
FuzzDB (https://github.com/fuzzdb-project/fuzzdb) - A database of attack vectors for web application testing. It provides a range of payloads, attack vectors, and fuzzing techniques for testing web applications, including SQL injection, cross-site scripting, and directory traversal.
XSS Payloads (https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XSS%20Injection) - A collection of cross-site scripting payloads for web application testing. It provides a range of payloads for testing various XSS vectors, including stored XSS, reflected XSS, and DOM-based XSS.
CrackMapExec (https://github.com/byt3bl33d3r/CrackMapExec) - A tool for password spraying, credential stuffing, and lateral movement in Windows environments. It provides a range of features for red teaming, including enumerating users, hosts, and services, as well as testing passwords and launching attacks.
MITRE ATT&CK (https://attack.mitre.org/) - A framework for understanding and categorizing cyber threats. It provides a range of techniques, tactics, and procedures used by attackers, as well as a mapping to the different stages of a cyberattack.
Snort (https://www.snort.org/) - A tool for intrusion detection and prevention. It provides a range of features for detecting and blocking malicious traffic, including signature-based and behavior-based detection, as well as network traffic analysis.
OSINT Framework (https://osintframework.com/) - A collection of tools and resources for open-source intelligence gathering. It provides a range of techniques and tools for gathering information about targets, including social media analysis, domain name and IP address information, and dark web analysis.
Maltego (https://www.maltego.com/) - A tool for collecting and analyzing information about targets. It provides a range of features for gathering and visualizing information, including social media analysis, email tracing, and network mapping.
ReversingLabs (https://www.reversinglabs.com/) - A platform for analyzing and classifying malware. It provides a range of features for analyzing and classifying malware, including static and dynamic analysis, behavior-based detection, and threat intelligence.
VirusTotal (https://www.virustotal.com/) - A platform for analyzing and detecting malware. It provides a range of features for analyzing files, URLs, and domains, including signature-based and behavior-based detection, as well as threat intelligence.
Cuckoo Sandbox (https://cuckoosandbox.org/) - A tool for analyzing and detecting malware. It provides a range of features for analyzing and detecting malware, including dynamic analysis, behavior-based detection, and threat intelligence.
Shodan (https://www.shodan.io/) - A search engine for internet-connected