Essential Resources for Red Team in Cyber Security

Last updated on July 8th, 2024 at 03:51 am

Roadmap

  1. https://roadmap.sh/cyber-security
  2. Roadmap for Beginners : Cyber_Security_Roadmap_(Beginners)_ethicalhackx.pdf

CTF / Skills practice platforms:

  1. Picoctf: https://picoctf.org/
  2. Tryhackme: https://tryhackme.com/
  3. Hackthebox : https://www.hackthebox.com/
  4. Root-me: https://www.root-me.org/
  5. pwned labs: https://pwnedlabs.io/
  6. Ctftime: https://ctftime.org/
  7. portswigger: https://portswigger.net/web-security
  8. ctflearn : https://ctflearn.com/
  9. hackthissite : https://www.hackthissite.org/
  10. google-gruyere : https://google-gruyere.appspot.com/
  11. Damn Vulnerable iOS App – https://github.com/prateek147/DVIA
  12. Defend the Web : https://defendtheweb.net/
  13. OverTheWire: https://overthewire.org/wargames/
  14. hacksplaining : https://www.hacksplaining.com/
  15. hackinghub: https://app.hackinghub.io/
  16. Embedded Security CTF: https://microcorruption.com/
  17. xss practice : https://xss-game.appspot.com/level1
  18. . CyberWolf-Security: https://leonteale.gitbook.io/cyberwolf-security\
  19. HTB Academy: https://academy.hackthebox.com/
  20. Hackmyvm: https://hackmyvm.eu/
  21. Vulnlab: https://www.vulnlab.com/
  22. Thunder CTF : https://labs.thundercipher.tech
  23. Bug Bounty Hunter: https://www.bugbountyhunter.com/
  24. Pwnable: https://pwnable.kr/#
  25. Crackme: https://crackmes.one/
  26. Offset play : https://portal.offsec.com/labs/play
  27. Offsec Practice : https://portal.offsec.com/labs/practice
  28. pentesterlab : https://pentesterlab.com/
  29. sourcecodester : https://www.sourcecodester.com/

Source Code Review

  1. securecode : https://securecode.wiki/
  2. sourcecodester : https://www.sourcecodester.com/

Cloud

  1. https://hackingthe.cloud/

Bug Hunting platforms

  1. Bugcrowd
  2. HackerOne
  3. yeswehack
  4. Intigriti
  5. HackenProof
  6. openbounty

Invitation based

  1. Synack : https://boards.greenhouse.io/synacksrt/jobs/150860
  2. Yogosha : https://app.yogosha.com/signup/researcher
  3. Cobalt: https://boards.greenhouse.io/cobaltio/jobs/5688200002

API testing

  1. https://www.freecodecamp.org/news/what-is-an-api-and-how-to-test-it/
  2. https://cheatography.com/tag/api

General useful links

  1. bb radar: https://bbradar.io/
  2. Zero-day: https://0day.today/
  3. https://vulnrepo.com/
  4. https://reconshell.com/bug-bounty-tools/

Writeup or cheat sheet

  1. https://infosecwriteups.com/
  2. https://pentester.land/writeups/
  3. https://rashahacks.com/
  4. https://d00mfist1.gitbooks.io/ctf/content
  5. https://swisskyrepo.github.io/
  6. https://appsecexplained.gitbook.io/appsecexplained
  7. https://ed4m4s.blog
  8. https://cheatsheetseries.owasp.org/
  9. https://www.ired.team/

Tools

  1. Burpsuite
  2. Caido
  3. owasp zap
  4. nessus
  5. Metasploit
  6. openVAS
  7. Wireshark
  8. w3af
  9. Hashcat
  10. John the ripper
  11. Postman
  12. Netsparker
  13. Nikto

Recon Tools

  1. subfinder : https://github.com/projectdiscovery/subfinder
  2. Sublist3r : https://github.com/aboul3la/Sublist3r
  3. Assetfinder : https://github.com/tomnomnom/assetfinder
  4. Censys: https://search.censys.io/
  5. Shodan: https://www.shodan.io/
  6. Keyhacks: https://github.com/streaak/keyhacks
  7. Pdtm : https://github.com/projectdiscovery/pdtm
  8. nuclei : https://github.com/projectdiscovery/nuclei
  9. notify : https://github.com/projectdiscovery/notify
  10. waybackurls: https://github.com/tomnomnom/waybackurls
  11. Httpx: https://github.com/projectdiscovery/httpx
  12. Amass : https://github.com/owasp-amass/amass
  13. Paramspider : https://github.com/devanshbatham/ParamSpider
  14. way more: https://github.com/xnl-h4ck3r/waymore
  15. Ffuf : https://github.com/ffuf/ffuf
  16. Jsecret : https://github.com/raoufmaklouf/jsecret
  17. Jsfscan : https://github.com/KathanP19/JSFScan.sh
  18. JS-Scan : https://github.com/zseano/JS-Scan
  19. Fofa : https://en.fofa.info/
  20. Knock : https://github.com/guelfoweb/knock
  21. Wayback archive web version : https://web.archive.org/cdx/search/cdx?url=.domain.com/&output=text&fl=original&collapse=urlkey
  22. Pentest-tools: https://pentest-tools.com/
  23. Gowitness: https://github.com/sensepost/gowitness
  24. ZoomEye: https://github.com/knownsec/ZoomEye-python
  25. EyeWitness : https://github.com/RedSiege/EyeWitness
  26. Aquatone : https://github.com/michenriksen/aquatone
  27. Crlfi: https://github.com/karthi-the-hacker/crlfi
  28. XSStrike : https://github.com/s0md3v/XSStrike
  29. Subdominator: https://github.com/RevoltSecurities/Subdominator
  30. Dnsdumpster: https://dnsdumpster.com/
  31. Feroxbuster : https://github.com/epi052/feroxbuster
  32. Rustscan : https://github.com/RustScan/RustScan
  33. Gau : https://github.com/lc/gau
  34. OpenRedireX : https://github.com/devanshbatham/OpenRedireX
  35. Nmap : https://nmap.org/download.html
  36. Dirsearch : https://github.com/maurosoria/dirsearch
  37. Gobuster : https://github.com/OJ/gobuster
  38. Reconftw : https://github.com/six2dez/reconftw
  39. Altdns : https://github.com/infosec-au/altdns
  40. Rustscan : https://github.com/RustScan/RustScan
  41. Gospider : https://github.com/jaeles-project/gospider
  42. Naabu : https://github.com/projectdiscovery/naabu
  43. Assetfinder : https://github.com/tomnomnom/assetfinder
  44. Gotator : https://github.com/Josue87/gotator
  45. Masscan : https://github.com/robertdavidgraham/masscan
  46. Infoga : https://github.com/The404Hacking/Infoga
  47. JSFScan : https://github.com/KathanP19/JSFScan.sh
  48. Slackcat : https://github.com/dwisiswant0/slackcat
  49. GitGraber : https://github.com/hisxo/gitGraber
  50. Red Hawk : https://github.com/Tuhinshubhra/RED_HAWK
  51. Anew : https://github.com/tomnomnom/anew
  52. sql map : https://github.com/sqlmapproject/sqlmap
  53. jsql-injection : https://github.com/ron190/jsql-injection
  54. bbqsql : https://github.com/CiscoCXSecurity/bbqsql
  55. Dsss : https://github.com/stamparm/DSSS
  56. whitewindow : https://github.com/WhitewidowScanner/whitewidow
  57. 403bypasser : https://github.com/yunemse48/403bypasser
  58. WhatWeb : https://github.com/urbanadventurer/WhatWeb
  59. dalfox : https://github.com/hahwul/dalfox
  60. XSStrike : https://github.com/s0md3v/XSStrike
  61. xss_vibes : https://github.com/faiyazahmad07/xss_vibes
  62. jsecrets : https://github.com/pixielabs/jsecrets
  63. cloud enum : https://github.com/initstring/cloud_enum
  64. Hunter: https://hunter.how/
  65. Blindf: https://dorkking.blindf.com/
  66. Bgp: https://bgp.he.net/
  67. Nuclei Templates: https://nuclei-templates.netlify.app/
  68. SecretFinder : https://github.com/m4ll0k/SecretFinder

Post exploitation

  1. Linux exploit suggested: https://github.com/The-Z-Labs/linux-exploit-suggester
  2. linpeas : https://github.com/peass-ng/PEASS-ng/tree/master/linPEAS
  3. LinEnum : https://github.com/rebootuser/LinEnum

Note-taking apps

  1. Obsidian
  2. Notion
  3. Cherry Tree
  4. One Note
  5. gitbook
  6. evernote
  7. joplin

Test bugs in bug hunting or penetration testing

List of bugs
  1. 2FA bypass
  2. Authentication bypass
  3. Array Index Underflow (CWE-129)
  4. Autocomplete Enabled on Sensitive Form Fields
  5. API Security Vulnerabilities
  6. Account Takeover
  7. Broken Authentication and Session Management
  8. Buffer Over-read (CWE-126)
  9. Buffer Overflow
  10. Buffer Underflow (CWE-124)
  11. Buffer Under-read (CWE-127)
  12. Buffer Overflow Heap-based
  13. Business Logic Errors (CWE-840) or Logic Flaws
  14. Brute Force Attacks
  15. Classic Buffer Overflow (CWE-120) or Buffer Copy without Checking Size of Input
  16. Cleartext Storage of Sensitive Information (CWE-312)
  17. Cleartext Transmission of Sensitive Information (CWE-319)
  18. Content Spoofing
  19. Cookie Injection
  20. clickjacking
  21. Credential/Session Prediction
  22. Client-Side Enforcement of Server-Side Security (CWE-602)
  23. Code Injection (CWE-94)
  24. Command Injection – Generic (CWE-77) or Command Injection
  25. CRLF Injection (CWE-93)
  26. Cross-origin resource sharing (CORS)
  27. [x] Cross-Site Request Forgery (CSRF) (CWE-352)
  28. Cross-site Scripting – Basic (CWE – 80)
  29. Cross-site Scripting (XSS) – DOM (CWE-79)
  30. Cross-site Scripting (XSS) – Generic (CWE-79)
  31. Cross-site Scripting (XSS) – Reflected (CWE-79)
  32. Cross-site Scripting (XSS) – Stored (CWE-79)
  33. Cryptographic Issues – Generic (CWE-310) or Cryptographic Failures
  34. Credential Stuffing
  35. Content Security Policy (CSP) Bypass
  36. Cache Control Misconfigurations
  37. Download of Code Without Integrity Check – CWE-494
  38. Denial of Service (CWE-400) or Uncontrolled Resource Consumption
  39. Default Credentials:
  40. Dependency Confusion
  41. Deserialization of Untrusted Data (CWE-502)
  42. Directory traversal
  43. Double Free (CWE-415)
  44. DNS Hijacking
  45. DOM-based Vulnerabilities
  46. Expression Language Injection
  47. Email Header Injection
  48. External Control of Assumed-Immutable Web Parameter – CWE-472
  49. Execution with Unnecessary Privileges – CWE-250
  50. Exposed Administration Panels
  51. Exposed Debugging Information
  52. Exposed Error Handling Information
  53. File Upload or Unrestricted File Upload
  54. Form/Function Level Access Control
  55. Forced Browsing (CWE-425)
  56. Format String Attacks
  57. Heap Overflow (CWE-122)
  58. HTTP Host header attacks OR Host Header Injection
  59. HTTP Parameter Pollution
  60. HTTP Request Smuggling (CWE-444)
  61. HTTP Response Splitting (CWE-113)
  62. HTML Injection
  63. Hidden Field Manipulation
  64. Improper Access Control
  65. Improper Input Validation – CWE-20
  66. Improper Access Control – Generic (CWE-284)
  67. Improper Authentication
  68. Improper Authentication – Generic (CWE-287)
  69. Improper Authorization (CWE-285)
  70. Improper Certificate Validation (CWE-295)
  71. Improper Following of a Certificate’s Chain of Trust (CWE-296)
  72. Improper Neutralization of HTTP Headers for Scripting Syntax (CWE-644)
  73. Improper Null Termination (CWE-170)
  74. Improper Restriction of Authentication Attempts (CWE-307)
  75. Improper Neutralization of CRLF Sequences in HTTP Headers – (CWE-113)
  76. Improper Handling of Extra Parameters – (CWE – 235)
  77. Insecure HTTP Methods
  78. Insufficient Session Expiration
  79. Insufficient Transport Layer Protection
  80. Inadequate Encryption Strength (CWE-326)
  81. Inadequate Access Controls
  82. Incorrect Calculation of Buffer Size (CWE-131)
  83. Information Disclosure / Sensitive data exposure
  84. Incorrect Session Management
  85. Information Disclosure (CWE-200)
  86. Information Exposure Through an Error Message (CWE-209)
  87. Information Exposure Through Debug Information (CWE-215)
  88. Information Exposure Through Directory Listing (CWE-548)
  89. Insecure deserialization
  90. Insecure Direct Object Reference (IDOR) (CWE-639)
  91. Insecure Storage of Sensitive Information (CWE-922)
  92. Insecure Password Reset Functionality
  93. Insufficient Session Expiration (CWE-613)
  94. Insecure Configuration Management
  95. Insufficiently Protected Credentials (CWE-522)
  96. Integer Overflow (CWE-190)
  97. Integer Underflow (CWE-191)
  98. Information Leakage and Improper Error Handling
  99. Intentional Information Exposure (CWE-213)
  100. Incorrect Permission Assignment for Critical Resource – CWE-732
  101. Insecure Cookies
  102. Insecure CORS Policy
  103. Inadequate Transport Layer Protection
  104. Integer Overflow or Wraparound
  105. JWT Token Manipulation
  106. Key Exchange without Entity Authentication (CWE-322)
  107. LDAP Injection (CWE-90)
  108. Leftover Debug Code (Backdoor) (CWE-489)
  109. Local File Inclusion
  110. LLM01: Prompt Injection
  111. LLM02: Insecure Output Handling
  112. LLM03: Training Data Poisoning
  113. LLM04: Model Denial of Service
  114. LLM05: Supply Chain Vulnerabilities
  115. LLM06: Sensitive Information Disclosure
  116. LLM07: Insecure Plugin Design
  117. LLM08: Excessive Agency
  118. LLM09: Overreliance
  119. LLM10: Model Theft
  120. Malware (CAPEC-549)
  121. Missing HttpOnly Flag on Cookies
  122. Missing Secure Flag on Cookies
  123. Man-in-the-Middle (CWE-300)
  124. Memory Corruption – Generic (CWE-119)
  125. Misconfiguration (CWE-16)
  126. Misconfigured CORS
  127. Missing Encryption of Sensitive Data (CWE-311)
  128. Missing Required Cryptographic Step (CWE-325)
  129. Missing Security Headers
  130. Missing Authentication for Critical Function – CWE-306
  131. Missing Content-Security-Policy (CSP) Headers
  132. Mass Assignment
  133. Memory Corruption
  134. Misconfigured S3 Buckets
  135.  NULL Pointer Dereference (CWE-476)
  136. Null Byte Injection
  137.  OAuth authentication
  138. Off-by-one Error (CWE-193)
  139. Open Redirect (CWE-601) or Unvalidated Redirects and Forwards
  140. OS Command Injection (CWE-78)
  141. Out-of-bounds Read (CWE-125)
  142. Off-by-one Error
  143. Password in Configuration File (CWE-260)
  144. Path Traversal (CWE-22)
  145. Phishing (CAPEC-98)
  146. Plaintext Storage of a Password (CWE-256)
  147. Privacy Violation (CWE-359)
  148. Privilege Escalation (CAPEC-233)
  149. Prototype pollution
  150. Path Parameter Vulnerabilities
  151. Parameter Pollution
  152. Parameter Tampering
  153. Parameter Delimiter
  154. Password Spraying
  155. Passwords in Clear Text
  156.  rate limit
  157. Race Condition – CWE-362
  158. Reliance on Cookies without Validation and Integrity Checking in a Security Decision (CWE-784)
  159. Reliance on Untrusted Inputs in a Security Decision (CWE-807)
  160. Remote Code Execution
  161. Remote File Inclusion (CWE-98)
  162. Resource Injection (CWE-99)
  163. Reusing a Nonce, Key Pair in Encryption (CWE-323)
  164. Reversible One-Way Hash (CWE-328)
  165. Reflected File Download (RFD)
  166. Stack Overflow
  167. Shellshock Vulnerability (Bash Bug)
  168. Security Through Obscurity (CWE-656)
  169. Security Misconfiguration
  170. Sensitive Information Passed to HTTP by Default
  171. Server-Side Request Forgery (SSRF) (CWE-918)
  172. Server-side template injection
  173. Session Fixation (CWE-384)
  174. SQL Injection (CWE-89)
  175. Session Hijacking
  176. Stack Overflow (CWE-121)
  177. Storing Passwords in a Recoverable Format (CWE-257)
  178. Subdomain Takeover
  179. Sensitive Cookie in HTTPS Session Without ‘Secure’ Attribute – CWE-614
  180. Slow HTTP DoS Attack (Slowloris)
  181.  Template Injection
  182. Timing Attack
  183. Time-of : -check Time-of-use (TOCTOU) Race Condition (CWE-367)
  184. Type Confusion (CWE-843)
  185. UI Redressing (Clickjacking) (CAPEC-103)
  186. Unprotected Transport of Credentials (CWE-523)
  187. Unrestricted Upload of File with Dangerous Type – CWE-434
  188. Untrusted Search Path – CWE-426
  189. Unverified Password Change (CWE-620)
  190. Uncontrolled Format String
  191. Use After Free (CWE-416)
  192. Use of a Broken or Risky Cryptographic Algorithm (CWE-327)
  193. Use of a Key Past its Expiration Date (CWE-324)
  194. Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) (CWE-338)
  195. Use of Externally-Controlled Format String (CWE-134)
  196. Use of Hard-coded Credentials (CWE-798)
  197. Use of Hard-coded Cryptographic Key (CWE-321)
  198. Use of Hard-coded Password (CWE-259)
  199. Use of Inherently Dangerous Function (CWE-242)
  200. Use of Insufficiently Random Values (CWE-330)
  201. Unprotected Files and Directories
  202. Unsecured JSONP Endpoints
  203. Using Components with Known Vulnerabilities
  204. Use of a One-Way Hash without a Salt – CWE-759
  205. Unrestricted Input Bug – Exploiting Server-Side Weakness
  206. Violation of Secure Design Principles (CWE-657)
  207. Weak Session Management
  208. Weak Transport Layer Security
  209. Weak Cryptographic Hashes
  210. Weak Cryptography for Passwords (CWE-261)
  211. Weak Password Recovery Mechanism for Forgotten Password (CWE-640)
  212. Web cache poisoning or Cache Poisoning or Cookie Poisoning
  213. Web Cache Deception
  214. Web Sockets
  215. Weak Encryption
  216. Weak Captcha Implementation
  217. Wrap-around Error (CWE-128)
  218. Write-what-where Condition (CWE-123)
  219. Weak Password Requirements (CWE-521)
  220. XML Entity Expansion (CWE-776)
  221. XML External Entities (XXE) (CWE-611)
  222. XML external entity (XXE) injection
  223. XML Injection (CWE-91)
  224. XSS Using MIME Type Mismatch (CAPEC-209)
  225. Zero-Day Exploits

Spawning a shell

python -c 'import pty; pty.spawn("/bin/sh")' 
python3 -c 'import pty; pty.spawn("/bin/bash")'

script -qc /bin/bash /dev/null

echo os.system('/bin/bash') 
/bin/sh -i 
perl -e 'exec "/bin/sh";' 
perl: exec "/bin/sh"; 
ruby: exec "/bin/sh" 
lua: os.execute('/bin/sh') 
exec "/bin/sh"; 
/bin/bash -i
exec "/bin/sh"                # (From within IRB) 
:!bash                        # (From within vi)
:set shell=/bin/bash:shell    # (From within vi) 
!sh                           # (From within nmap) 

Interactive shell

which python3
python3 -c 'import pty; pty.spawn("/bin/bash")'
ctrl + z
stty raw -echo; fg
export TERM=xterm

Privilege Escalation

Linux

  1. https://medium.com/@Varma_Chekuri/linux-privilege-escalation-part-1-c35b6c5b4841
  2. https://medium.com/@Varma_Chekuri/privilege-escalation-in-linux-2-c2ececd7f385
  3. https://medium.com/@Varma_Chekuri/privilege-escalation-in-linux-3-b1430b1ea221

Windows

  1. https://medium.com/@Varma_Chekuri/windows-privilege-escalation-aa2c048d246b
  2. https://medium.com/@Varma_Chekuri/windows-privilege-escalation-2-f0dfb1021213

Reverse shell links

  1. https://www.revshells.com/
  2. https://swisskyrepo.github.io/InternalAllTheThings/cheatsheets/shell-reverse-cheatsheet/
  3. https://d00mfist1.gitbooks.io/ctf/content/spawning_shells.html

Binaries

  1. Gtfobins: https://gtfobins.github.io/ [unix / Linux ]
  2. Lolbas: https://lolbas-project.github.io/ [ windows ]
  3. drivers: https://www.loldrivers.io/ [ Vulnerable drivers ]

GitHub Repos

  1. https://github.com/The-Art-of-Hacking/h4cker
  2. https://github.com/Hack-with-Github/Awesome-Hacking
  3. https://github.com/enaqx/awesome-pentest
  4. https://github.com/B3nac/Android-Reports-and-Resources
  5. https://github.com/infoslack/awesome-web-hacking
  6. https://github.com/JohnHammond/security-resources

Wordlists

  1. https://github.com/random-robbie/bruteforce-lists
  2. https://wordlists.assetnote.io/
  3. https://github.com/danielmiessler/SecLists
  4. https://github.com/kongsec/Wordpress-BruteForce-List

Checklists

  1. https://github.com/KathanP19/HowToHunt
  2. https://github.com/Az0x7/vulnerability-Checklist
  3. https://github.com/swisskyrepo/PayloadsAllTheThings

Extensions

Browser Extensions

  1. wappalyzer
  2. Cookie Editor
  3. Http heders
  4. foxyproxy
  5. fileon
  6. open multiple URLs
  7. hackbar
  8. shodan
  9. netcraft
  10. Builtwith
  11. Google Maps Api Checker

Burp Suite extensions

  1. collaborator everywhere
  2. InQL – GraphQL Scanner
  3. param miner
  4. NoSQLi Scanner
  5. JSON Web Tokens

Keep up to date with the latest news

Appsec

  1. https://github.com/Simpsonpt/AppSecEzine
  2. https://www.reddit.com/r/websecurityresearch/
  3. https://appsec.beehiiv.com/

Yearly Reports

  1. https://survey.stackoverflow.co/2023/
  2. https://www.verizon.com/business/resources/reports/dbir/2023/master-guide/
  3. https://www.hackerone.com/resources/reporting/7th-annual-hacker-powered-security-report-2023

General CyberSecurity News

  1. https://tldrsec.com/
  2. https://www.reddit.com/r/netsec/
  3. https://thehackernews.com/
  4. https://executiveoffense.beehiiv.com/
  5. https://danielmiessler.com/
  6. https://www.hackthebox.com/blog/

Others

  1. https://www.criticalthinkingpodcast.io/
  2. https://www.theregister.com/
  3. https://www.youtube.com/c/GeraldAuger
  4. https://hackyx.io/
  5. https://dorki.io
  6. https://bbradar.io/
  7. https://book.hacktricks.xyz/
  8. https://cheatsheetseries.owasp.org/IndexTopTen.html
  9. https://appsecexplained.gitbook.io/appsecexplained/
  10. https://osintframework.com/
  11. https://quickref.me/index.html
  12. https://www.cvedetails.com/
  13. https://cvexploits.io/
  14. https://sqlitebrowser.org/

Youtube

  1. https://www.youtube.com/@RanaKhalil101
  2. https://www.youtube.com/@ippsec
  3. https://www.youtube.com/@criticalthinkingpodcast
  4. https://www.youtube.com/@BittenTech
  5. https://www.youtube.com/@CristiVladZ
  6. https://www.youtube.com/@FarahHawa
  7. https://www.youtube.com/@HackerSploit
  8. https://www.youtube.com/@InsiderPhD
  9. https://www.youtube.com/@_JohnHammond
  10. https://www.youtube.com/@LiveOverflow
  11. https://www.youtube.com/@LoiLiangYang
  12. https://www.youtube.com/@TheXSSrat
  13. https://www.youtube.com/@TomNomNomDotCom
  14. https://youtube.com/@impratikdabhi
  15. https://www.youtube.com/@jhaddix
  16. https://www.youtube.com/@ByteBloggerBase
  17. https://www.youtube.com/@TylerRamsbey
  18. https://www.youtube.com/@BugBountyReportsExplained
  19. https://www.youtube.com/@NetworkChuck
  20. https://www.youtube.com/@networkchuckacademy

Twitter

  1. https://twitter.com/jhaddix
  2. https://twitter.com/NahamSec
  3. https://twitter.com/stokfredrik
  4. https://twitter.com/3nc0d3dGuY
  5. https://x.com/HunterMapping
  6. https://x.com/Bugcrowd
  7. https://x.com/Hacker0x01
  8. https://x.com/yeswehack
  9. https://x.com/intigriti
  10. https://twitter.com/adityashende17
  11. https://twitter.com/GodfatherOrwa
  12. https://x.com/CVEnew
  13. https://twitter.com/h4x0r_fr34k
  14. https://twitter.com/ReconOne_bk
  15. https://twitter.com/theXSSrat
  16. https://x.com/7h3h4ckv157
  17. https://twitter.com/TCMSecurity
  18. https://twitter.com/0xTib3rius
  19. https://twitter.com/trick3st
  20. https://twitter.com/Ox4d5a
  21. https://twitter.com/CyberWarship
  22. https://x.com/hunter0x7

Referrals

  1. Digitalocean : https://m.do.co/c/1f650a3ace33
  2. Hostinger : https://hostinger.in?REFERRALCODE=1NAGASAIKIR24

when I find good resources or if you find good resources mentioned in the comments I’ll update the blog

Happy Hacking !!!

Connect me on
Linkedin: https://www.linkedin.com/in/nagasaikiran010/

49 thoughts on “Essential Resources for Red Team in Cyber Security”

  1. Hello! I’ve been following your website for a while now and finally got
    the courage to goo ahead and give you a shout out from Austin Tx!
    Just wanted to tell you keep up the fantastic work!

    My webpzge – Werner

  2. I have been browsing on-line more than 3 hours nowadays, yet I
    by no means discovered any fascinating article like yours.
    It is beautiful price sufficient for me. In my opinion, if all site owners and bloggers made
    excellent content material as you did, the net can be much more useful
    than ever before.

  3. Wonderful website you have here but I was wanting to know if you knew of any forums that cover the same topics discussed
    in this article? I’d really like to be a part of group where I can get feed-back from
    other knowledgeable people that share the
    same interest. If you have any recommendations, please let me know.
    Thanks a lot!

  4. Greetings from Carolina! I’m bored at work so I decided to check out your site
    on my iphone during lunch break. I really like the
    info you provide here and can’t wait to take a look when I get home.

    I’m shocked at how quick your blog loaded on my cell
    phone .. I’m not even using WIFI, just 3G .. Anyways, wonderful site!

  5. Hello there, You have done a great job. I’ll definitely digg it and personally suggest
    to my friends. I’m sure they’ll be benefited from this website.

  6. Hello just wanted to give you a quick heads up. The text in your article seem to be
    running off the screen in Firefox. I’m not sure if this is a format issue or something
    to do with internet browser compatibility but I thought
    I’d post to let you know. The design and style look great though!

    Hope you get the problem fixed soon. Many thanks

  7. What i do not understood is in truth how you’re not actually a lot more well-appreciated than you might be now.
    You’re so intelligent. You recognize thus considerably relating to this subject,
    made me in my view believe it from numerous varied angles.
    Its like men and women aren’t involved unless it’s one thing to do with Girl
    gaga! Your own stuffs great. At all times take care of it up!

  8. Diviashop simplifies business setup for non-USA/UK residents by offering legal USA LLC or UK LTD formation, business bank accounts, and seamless payment gateway integration. A complete solution to start and grow your global business remotely!

  9. Hi this is kind of of off topic but I was wondering if blogs use
    WYSIWYG editors or if you have to manually code with HTML.
    I’m starting a blog soon but have no coding experience
    so I wanted to get guidance from someone with
    experience. Any help would be greatly appreciated!

  10. Hi all, here every person is sharing these familiarity, so it’s pleasant
    to read this website, and I used to visit this blog all the time.

  11. I’m curious to find out what blog system you’re
    using? I’m having some minor security issues with my latest site and I would like to
    find something more safe. Do you have any solutions?

  12. This blog post is really helpful for us. My simple advice for visitors- if anyone wants to set up their own merchant accounts like Stripe or others, they can simply contact Diviashop for assistance in setting up while following all legal processes.

  13. I am curious to find out what blog platform you’re utilizing?

    I’m having some minor security issues with my latest blog and I would
    like to find something more safeguarded. Do you have any suggestions?

  14. Hi there! Do you know if they make any plugins to assist with SEO?
    I’m trying to get my blog to rank for some targeted keywords but I’m not seeing very good success.
    If you know of any please share. Thank you!

  15. Aw, this was an extremely good post. Taking the time and actual effort to generate a superb
    article… but what can I say… I hesitate a lot and don’t seem to get
    anything done.

  16. Great post. I was checking continuously this
    blog and I’m impressed! Extremely helpful info particularly the last part
    🙂 I care for such information a lot. I was looking for this certain info for a very long time.
    Thank you and best of luck.

  17. Its like you read my mind! You appear to know a lot about this, like you wrote the
    book in it or something. I think that you could do with a few pics to drive the message home a little bit, but other than that, this is fantastic blog.

    A great read. I’ll definitely be back.

  18. I just could not depart your website before suggesting that I
    really loved the usual info an individual provide to your visitors?
    Is gonna be again often to check up on new posts

  19. Superb blog you have here but I was curious about
    if you knew of any message boards that cover the
    same topics discussed in this article? I’d really love to be a part of online community
    where I can get comments from other experienced people that share the same interest.
    If you have any suggestions, please let me know.
    Thanks!

  20. Hey there! I just wanted to ask if you ever have any issues with hackers?
    My last blog (wordpress) was hacked and I ended up losing several weeks of hard work due to no data backup.
    Do you have any solutions to protect against hackers?

  21. Superb blog! Do you have any helpful hints for aspiring writers?

    I’m hoping to start my own site soon but I’m a little lost on everything.
    Would you advise starting with a free platform like WordPress or go for a paid option? There are so many options out
    there that I’m totally overwhelmed .. Any recommendations?
    Cheers!

  22. I’ve found this blog to be an invaluable resource! The information is so easy to understand and helpful. If you’re curious about business formation for non-US and UK residents, click on my name for more details.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top