# README

![Red\_Teaming\_Logo](https://github.com/user-attachments/assets/9a8e387d-351d-4dcc-a672-487cf3d003d7)

***

> \[!CAUTION] This repository contains cheatsheets, notes, and scripts related to my learning in cybersecurity, particularly Red Teaming. You'll find a variety of resources that I've compiled over the years, including:
>
> * [x] **Cheatsheets**: Quick reference guides for common tools and techniques.
> * [x] **Guides**: Detailed explanations and insights on various cybersecurity topics.
> * [x] **Scripts**: Useful scripts for automating tasks and improving efficiency.
>
> An updated PDF of these TTPs is available [here](https://github.com/RoseSecurity/Red-Teaming-TTPs/blob/main/Guides/Red_Teaming_TTPs.pdf) as well. Feel free to explore, use, and contribute to these resources. Any notes, improvements, or additional content are welcome!

### Table of Contents

* [Cheatsheets](https://github.com/RoseSecurity/Red-Teaming-TTPs/blob/main/Cheatsheets/README.md)
* [Cloud](https://rosesecurity.gitbook.io/red-teaming-ttps/cloud)
* [Guides](https://github.com/RoseSecurity/Red-Teaming-TTPs/blob/main/Guides/README.md)
* [ICS](https://rosesecurity.gitbook.io/red-teaming-ttps/ics)
* [Linux](https://rosesecurity.gitbook.io/red-teaming-ttps/linux)
* [Mac OSX](https://rosesecurity.gitbook.io/red-teaming-ttps/mac_osx)
* [Threat Intel](https://github.com/RoseSecurity/Red-Teaming-TTPs/blob/main/Theat_Intel.md)
* [Web](https://rosesecurity.gitbook.io/red-teaming-ttps/web)
* [Windows](https://rosesecurity.gitbook.io/red-teaming-ttps/windows)

### :boom: Free Resources to Practice

Share with your friends:

* [Academy Hackaflag BR](https://hackaflag.com.br/)
* [Attack-Defense](https://attackdefense.com)
* [Alert to win](https://alf.nu/alert1)
* [CTF Komodo Security](https://ctf.komodosec.com)
* [CMD Challenge](https://cmdchallenge.com)
* [Exploitation Education](https://exploit.education)
* [Google CTF](https://lnkd.in/e46drbz8)
* [HackTheBox](https://www.hackthebox.com)
* [Hackthis](https://www.hackthis.co.uk)
* [Hacksplaining](https://lnkd.in/eAB5CSTA)
* [Hacker101](https://ctf.hacker101.com)
* [Hacker Security](https://lnkd.in/ex7R-C-e)
* [Hacking-Lab](https://hacking-lab.com/)
* [HSTRIKE](https://hstrike.com)
* [ImmersiveLabs](https://immersivelabs.com)
* [LabEx Cybersecurity Free Labs](https://labex.io/free-labs/cybersecurity)
* [NewbieContest](https://lnkd.in/ewBk6fU5)
* [OverTheWire](http://overthewire.org)
* [Practical Pentest Labs](https://lnkd.in/esq9Yuv5)
* [Pentestlab](https://pentesterlab.com)
* [Penetration Testing Practice Labs](https://lnkd.in/e6wVANYd)
* [PentestIT LAB](https://lab.pentestit.ru)
* [PicoCTF](https://picoctf.com)
* [Practical Windows Forensics](https://github.com/bluecapesecurity/PWF)
* [PWNABLE](https://lnkd.in/eMEwBJzn)
* [Root-Me](https://www.root-me.org)
* [Root in Jail](http://rootinjail.com)
* [SANS Challenger](https://lnkd.in/e5TAMawK)
* [SmashTheStack](https://lnkd.in/eVn9rP9p)
* [The Cryptopals Crypto Challenges](https://cryptopals.com)
* [Try Hack Me](https://tryhackme.com)
* [Vulnhub](https://www.vulnhub.com)
* [W3Challs](https://w3challs.com)
* [WeChall](http://www.wechall.net)
* [Zenk-Security](https://lnkd.in/ewJ5rNx2)

### Contributing

PRs are welcome! We follow the typical "fork-and-pull" Git workflow.

1. **Fork** the repo on GitHub
2. **Clone** the project to your own machine
3. **Commit** changes to your own branch
4. **Push** your work back up to your fork
5. Submit a **Pull Request** so that we can review your changes

> \[!TIP] Be sure to merge the latest changes from "upstream" before making a pull request!

#### Many Thanks to Our Contributors

[![](https://contrib.rocks/image?repo=rosesecurity/red-teaming-ttps\&max=24)](https://github.com/rosesecurity/red-teaming-ttps/graphs/contributors)
