CyberSecurity ToolKit
search
Ctrlk
  • DoubtfulTurnip's CyberSecurity Toolkit
  • About the Turnip
  • CTF platforms
  • Tools List
    • Security Toolschevron-right
    • Security Tool Plugins & Scriptschevron-right
    • Privacy Toolschevron-right
    • Web Based Toolschevron-right
    • Misc Toolschevron-right
  • Guides
    • Cheat Sheetschevron-right
    • Specific Techniqueschevron-right
      • Crypto & Cracking
      • Exploit
      • Forensic
      • Post-Exploit
      • Red Team
      • Reversing & Binary Exploit
    • Tool Usage Guides
    • Quick Reference Commands and Codechevron-right
  • Education
    • Educational Resourceschevron-right
  • CTF Archive
    • Retired CTF Write-ups
    • CSC CTF 2020 Challengeschevron-right
    • CSC CTF 2020 Write-upschevron-right
  • Sources
    • Curated List of Collated Lists
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Guideschevron-right
  2. Specific Techniques

Red Team

hashtag

LogoGitHub - bluscreenofjeff/Red-Team-Infrastructure-Wiki: Wiki to collect Red Team infrastructure hardening resourcesGitHubchevron-right
LogoGitHub - samyk/slipstream: NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a websiteGitHubchevron-right
Contains useful code for CTFs

PreviousPost-Exploitchevron-leftNextReversing & Binary Exploitchevron-right

Last updated 4 years ago

Was this helpful?

Was this helpful?