# README

![Red\_Teaming\_Logo](https://github.com/user-attachments/assets/9a8e387d-351d-4dcc-a672-487cf3d003d7)

***

> \[!CAUTION] This repository contains cheatsheets, notes, and scripts related to my learning in cybersecurity, particularly Red Teaming. You'll find a variety of resources that I've compiled over the years, including:
>
> * [x] **Cheatsheets**: Quick reference guides for common tools and techniques.
> * [x] **Guides**: Detailed explanations and insights on various cybersecurity topics.
> * [x] **Scripts**: Useful scripts for automating tasks and improving efficiency.
>
> An updated PDF of these TTPs is available [here](https://github.com/RoseSecurity/Red-Teaming-TTPs/blob/main/Guides/Red_Teaming_TTPs.pdf) as well. Feel free to explore, use, and contribute to these resources. Any notes, improvements, or additional content are welcome!

### Table of Contents

* [Cheatsheets](https://github.com/RoseSecurity/Red-Teaming-TTPs/blob/main/Cheatsheets/README.md)
* [Cloud](/red-teaming-ttps/cloud.md)
* [Guides](https://github.com/RoseSecurity/Red-Teaming-TTPs/blob/main/Guides/README.md)
* [ICS](/red-teaming-ttps/ics.md)
* [Linux](/red-teaming-ttps/linux.md)
* [Mac OSX](/red-teaming-ttps/mac_osx.md)
* [Threat Intel](https://github.com/RoseSecurity/Red-Teaming-TTPs/blob/main/Theat_Intel.md)
* [Web](/red-teaming-ttps/web.md)
* [Windows](/red-teaming-ttps/windows.md)

### :boom: Free Resources to Practice

Share with your friends:

* [Academy Hackaflag BR](https://hackaflag.com.br/)
* [Attack-Defense](https://attackdefense.com)
* [Alert to win](https://alf.nu/alert1)
* [CTF Komodo Security](https://ctf.komodosec.com)
* [CMD Challenge](https://cmdchallenge.com)
* [Exploitation Education](https://exploit.education)
* [Google CTF](https://lnkd.in/e46drbz8)
* [HackTheBox](https://www.hackthebox.com)
* [Hackthis](https://www.hackthis.co.uk)
* [Hacksplaining](https://lnkd.in/eAB5CSTA)
* [Hacker101](https://ctf.hacker101.com)
* [Hacker Security](https://lnkd.in/ex7R-C-e)
* [Hacking-Lab](https://hacking-lab.com/)
* [HSTRIKE](https://hstrike.com)
* [ImmersiveLabs](https://immersivelabs.com)
* [LabEx Cybersecurity Free Labs](https://labex.io/free-labs/cybersecurity)
* [NewbieContest](https://lnkd.in/ewBk6fU5)
* [OverTheWire](http://overthewire.org)
* [Practical Pentest Labs](https://lnkd.in/esq9Yuv5)
* [Pentestlab](https://pentesterlab.com)
* [Penetration Testing Practice Labs](https://lnkd.in/e6wVANYd)
* [PentestIT LAB](https://lab.pentestit.ru)
* [PicoCTF](https://picoctf.com)
* [Practical Windows Forensics](https://github.com/bluecapesecurity/PWF)
* [PWNABLE](https://lnkd.in/eMEwBJzn)
* [Root-Me](https://www.root-me.org)
* [Root in Jail](http://rootinjail.com)
* [SANS Challenger](https://lnkd.in/e5TAMawK)
* [SmashTheStack](https://lnkd.in/eVn9rP9p)
* [The Cryptopals Crypto Challenges](https://cryptopals.com)
* [Try Hack Me](https://tryhackme.com)
* [Vulnhub](https://www.vulnhub.com)
* [W3Challs](https://w3challs.com)
* [WeChall](http://www.wechall.net)
* [Zenk-Security](https://lnkd.in/ewJ5rNx2)

### Contributing

PRs are welcome! We follow the typical "fork-and-pull" Git workflow.

1. **Fork** the repo on GitHub
2. **Clone** the project to your own machine
3. **Commit** changes to your own branch
4. **Push** your work back up to your fork
5. Submit a **Pull Request** so that we can review your changes

> \[!TIP] Be sure to merge the latest changes from "upstream" before making a pull request!

#### Many Thanks to Our Contributors

[![](https://contrib.rocks/image?repo=rosesecurity/red-teaming-ttps\&max=24)](https://github.com/rosesecurity/red-teaming-ttps/graphs/contributors)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://rosesecurity.gitbook.io/red-teaming-ttps/readme.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
