# redteam-tips **Repository Path**: csharphpython/redteam-tips ## Basic Information - **Project Name**: redteam-tips - **Description**: 关于红队方面的学习资料 - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 1 - **Forks**: 1 - **Created**: 2020-11-16 - **Last Updated**: 2022-06-27 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # RedTeam-Tips > 正在学习红队评估,特开此坑,欢迎各位在issues提交好的文献,持续更新,star支持一下,协助修正完善。 > 资料均来自网上收集,如未标明作者有侵权行为,请及时联系h4x0er[at]secbug.org进行删除或修改。 > 喜欢请点 Star,如果不打算贡献,千万别 Fork,Fork后的版本不会自动同步更新最新的版本,你不会享受到最新版本给你带来的快乐和惊喜。 [域安全浅析-基础概念及历史漏洞分析](https://mp.weixin.qq.com/s/R1J6UFKw_m8PVuI_pcUMkA) [内网渗透TIPS](https://github.com/Ridter/Intranet_Penetration_Tips) [域渗透初探](https://zhuanlan.zhihu.com/p/32074351) [高持续渗透系列课程](https://micropoor.blogspot.com/2019/01/php8.html) [高级攻防 100 课](https://github.com/Micropoor/Micro8) [100 课等经典攻防教材](https://github.com/Ma3k4H3d/Papers) [红蓝方攻防手册](https://github.com/infosecn1nja/AD-Attack-Defense) [优秀红队资源列表](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming) [红队标准渗透测试流程+常用命令](https://github.com/foobarto/redteam-notebook) [mitre 机构对横向移动的总结](https://attack.mitre.org/wiki/Lateral_Movement/) [彻底理解 Windows 认证 - 议题解读](https://payloads.online/archivers/2018-11-30/1) [内网大牛的学习历程](https://github.com/klionsec/klionsec.github.io) [从零开始内网渗透学习](https://github.com/l3m0n/pentest_study) [仿真靶场搭建:个人版PENTESTIT](https://www.freebuf.com/sectool/195632.html) [Exchange Privilege Elevation](https://evi1cg.me/archives/Exchange_Privilege_Elevation.html) [三层网络靶场搭建&MSF内网渗透](https://www.anquanke.com/post/id/170649) [域渗透总结](https://mp.weixin.qq.com/s?__biz=Mzg3NzE5OTA5NQ==&mid=2247483807&idx=1&sn=59be50aa5cc735f055db596269a857ce&chksm=cf27ea07f850631) [【域渗透】 SPN 扫描利用](https://rcoil.me/2019/06/%E3%80%90%E5%9F%9F%E6%B8%97%E9%80%8F%E3%80%91%20SPN%20%E6%89%AB%E6%8F%8F%E5%88%A9%E7%94%A8/) [域渗透——Pass The Hash的实现](https://xz.aliyun.com/t/1802/) [APT攻击技术学习指南](https://github.com/Yeti-791/APT-Guide) [APT事件分析报告汇总(密码P3mh)](https://eyun.baidu.com/enterprise/share/init?cid=8272253626392623208&uk=2882212757&sid=201903245688803144) [威胁猎人APT资料](https://github.com/blackorbird/APT_REPORT) [OSINT开源情报与侦察工具](https://start.me/p/GE7JQb/osint) [漫谈攻击链:从WebShell到域控的奇妙之旅](https://www.freebuf.com/articles/network/172578.html) [一次完整的从webshell到域控的探索之路](https://mp.weixin.qq.com/s/Yv6dDZBYTg2BbmnL_Vbf8w) [内网渗透(实验)之域渗透深入弹shell开3389拿域控](https://mp.weixin.qq.com/s/9-6F3JDlxdC1CkpzbC0Ebw) [从WebShell到域控实战详解](https://www.heibai.org/post/1533.html) [内网渗透之-域渗透基础](http://www.91ri.org/10154.html) [ 从Webshell到System再到域控]( https://zhuanlan.zhihu.com/p/38813123 ) [ Security-PPT系列安全书籍 ]( https://github.com/FeeiCN/Security-PPT/tree/master/security ) [ 内网渗透之PTH&PTT&PTK ]( https://www.cnblogs.com/bmjoker/p/10355979.html ) [ 从0开始你的域渗透之旅 ]( https://github.com/crazywa1ker/DarthSidious-Chinese ) [ Active-Directory-Pentest-Notes ]( https://github.com/uknowsec/Active-Directory-Pentest-Notes ) [DGA域名的今生前世:缘起、检测、与发展]( https://mp.weixin.qq.com/s/xbf0Qbppk8R0nx89Pb4YTg ) [MITRE | ATT&CK 中文站](https://huntingday.github.io/) [MITRE | ATT&CK](https://attack.mitre.org/) [红队专家工具包](https://github.com/infosecn1nja/Red-Teaming-Toolkit) [红队测试从0到1 - PART 1](https://xz.aliyun.com/t/2742) [红队测试从0到1 - PART 2](https://xz.aliyun.com/t/2764) [渗透利器Cobalt Strike - 第1篇 功能及使用](https://xz.aliyun.com/t/3975) [渗透利器Cobalt Strike - 第2篇 APT级的全面免杀与企业纵深防御体系的对抗](https://xz.aliyun.com/t/4191) [红队基础建设:隐藏你的C2 server](https://xz.aliyun.com/t/4509) [【译】一套可用于强化红队基础设施的补充资源](https://xz.aliyun.com/t/150) [一次红队之旅](https://xz.aliyun.com/t/2389) [要想加入红队,需要做好哪些准备?](https://xz.aliyun.com/t/4952) [关于后渗透当中Windows系统自带签名文件的白利用](https://lolbas-project.github.io/) [ATT&CK手册(修改版).pdf](https://github.com/Dm2333/ATTCK-PenTester-Book) [红队人员作战手册](https://github.com/klionsec/RedTeamer) [云上攻防:RED TEAMING FOR CLOUD](http://avfisher.win/archives/1175) [云渗透思路](https://www.moonsec.com/archives/1098) [2020攻防演练弹药库-您有主机上线请注意](https://blog.riskivy.com/2020%E6%94%BB%E9%98%B2%E6%BC%94%E7%BB%83%E5%BC%B9%E8%8D%AF%E5%BA%93-%E6%82%A8%E6%9C%89%E4%B8%BB%E6%9C%BA%E4%B8%8A%E7%BA%BF%E8%AF%B7%E6%B3%A8%E6%84%8F/) [远控免杀系列文章及配套工具](https://github.com/TideSec/BypassAntiVirus) [Pentest-and-Development-Tips](https://github.com/3gstudent/Pentest-and-Development-Tips) 后期计划重新细分下相关资料标签