CyberSecurity ToolKit
Ctrlk
  • DoubtfulTurnip's CyberSecurity Toolkit
  • About the Turnip
  • CTF platforms
  • Tools List
    • Security Tools
    • Security Tool Plugins & Scripts
    • Privacy Tools
    • Web Based Tools
    • Misc Tools
  • Guides
    • Cheat Sheets
    • Specific Techniques
      • Crypto & Cracking
      • Exploit
      • Forensic
      • Post-Exploit
      • Red Team
      • Reversing & Binary Exploit
    • Tool Usage Guides
    • Quick Reference Commands and Code
  • Education
    • Educational Resources
  • CTF Archive
    • Retired CTF Write-ups
    • CSC CTF 2020 Challenges
    • CSC CTF 2020 Write-ups
  • Sources
    • Curated List of Collated Lists
Powered by GitBook
On this page

Was this helpful?

  1. Guides
  2. Specific Techniques

Red Team

LogoGitHub - bluscreenofjeff/Red-Team-Infrastructure-Wiki: Wiki to collect Red Team infrastructure hardening resourcesGitHub
LogoGitHub - samyk/slipstream: NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a websiteGitHub
Contains useful code for CTFs

PreviousPost-ExploitNextReversing & Binary Exploit

Last updated 4 years ago

Was this helpful?