logo  ONESTOPCYBERSHOP

  Offensive Cyber (Red Team)

Posters | Cheat Sheets | Publications | Media | Tooling | Training | CTFs | Frameworks & Projects | Virtual Machines



    Posters

    Offensive Cyber (Red Team)

CMD Line KungFu
Download 
Penetration Testing
Download 
Pen Testing Blueprints
Download 
Pivots & Payloads
Download 
SecurityZines





    Cheat Sheets

    Scripting
Windows CLI
Download 
Windows & Linux CLI
Download 
Linux Commands
Download 
Linux CLI Fundamentals
Download 
Linux CLI
Download 
Linux Shell
Download 
Vim
Download 
Vi
Download 
Nano
Download 

    Cloud Platforms
AWS
Download 
GCP
Download 
Multi-Cloud CLI
Download 
Cloud Security DevOps
Download 

    PowerShell & WMIC
Download 
Download 
Download 
Download 
Download 

    Python
Download 
Download 

    Structures & Schemas
HEX & Regex
Download 
RegEx
Download 
sort & uniq
Download 
JSON & jq
Download 

    Query Languages
Log Parsing
Download 
SQLite
Download 
SQL
Download 
KQL
Download 
SPL (Splunk)
Download 
VT File Search Modifiers



    Cheat Sheets (Red Team)

Payloads All The Things

    Reconnaissance
Kali
Download 
NMAP
Download 
Google Hacking
Download 

    Network Interception/Enumeration
hping
Download 
Scapy
Download 
tcpdump
Download 
Netcat
Download 
Burp Suite
Download 

    Post Exploitation
Bloodhound
Download 
SharpHound
Download 
Metasploit
Download 
Empire
Download 
Pivoting
Download 
SMB Access from Linux
Download 

    Credential Harvesting

    Command & Control



    Publications

    Books

Red Team
Field Manual

Hacking with Kali:
Practical Pen Testing

Metasploit: The Pen
Tester's Guide

The Hacker Playbook:
Practical Pen Testing

Hacking: The Art
of Exploitation

7 Deadliest Web
Application Attacks

Social Engineering: The
Art of Human Hacking


    Blogs
Active Directory Security

PENTEST LAB

ins1gn1a

harmj0y

secjuice

Offensive OSINT


    Guides & Tutorials
Phishing Passwords
w/ PowerShell

GCP Offensive Swiss
Army Knife

Learning to Write
Custom Keylogger

Compromising IPv4
networks via IPv6

NTLM Relaying and
Kerberos delegation

5 Ways I Got Domain
Admin Before Lunch

INetSim & Burpsuite Lab

Building AD Lab in Azure

Pass-Back Attack

Group Policy Pwnage




    Media

    Videos & Tutorials
Become an Ethical Hacker for $0
Hacker's Physical Pentest Toolkit
How to get a Scammer's Location
Bug Bounty Basics
Bug Hunters Methodology

    Videos & Tutorials
Offensive Security

Joe Helle

HackerSploit

The XSS Rat

SheHacksPurple


    Webcasts & Podcasts
Offensive Security

Darknet Diaries

7 Minute Security

Adventures of Alice and Bob

The Hacker Chronicles

The Hacker Mind

What The Shell?




    Tooling

    Offensive Cyber (Red Team)

Sample Pen Test Report

Red Team Tool Roundup

100 Best Hacking Tools

Yuki Chan

awesome-browser-exploit

Exploit DB


    Note Taking & Checklists
KeepNote

cherrytree

Greenshot

Flameshot

Trilium

joplin

OWASP Testing


    Reconnaissance
GTFOBins

haveibeenpwned

hunter.io

amass

Expired Domains

Subdomain Enumeration

xnLinkFinder

crt.sh

Security Headers

theHarvester

sumrecon

MASSCAN

MassDNS

httprobe

subbrute

NMAP

nrich

Angry IP Scanner


    Weaponization
Inceptor

macro_pack

Dotpack

EvilClippy

Chimera


    Delivery
Pafish

ThePhish

PhishTool

Evilginx2

Muraena

NecroBrowser


    Network Emuneration
BloodHound

impacket

mitm6

Snaffler

MFASweep


    Post Exploitation
Metasploit

PowerSploit

Empire

Cobalt Strike

Shellter

merlin

CrackMapExec

ADFSpoof


    Credential Harvesting
JohnTheRipper

Hashcat

L0phtcrack

CrackStation

mimikatz

breach-parse


    Command & Control
PoshC2

LimeLighter




    Training

    Formal Training
TCM Security

PentesterAcademy

Black Hat Ethical Hacking

The XSS Rat

Offensive Security

SpectreOps

Certified Secure

PortSwigger Web Security Academy

Red Team Ops

Metasploit Unleashed


    CTFs & Ranges
HackTheBox

HackInTheBox

TryHackMe

Try2Hack

CyberSecLabs

H4CK1NG GOOGL3

CTF Challenge

PentesterLab

XSS Game

RUNCMD

Over The Wire

Root Me

EchoCTF

juice-shop

VulnHub

Vuln Machines


Bug Bounty

bugcrowd




    Frameworks & Projects

    Projects & Datasets
CALDERA

Unprotect

LOLBAS

Atomic Red Team




    Virtual Machines

    'Attacking' VMs
Kali

ParrotOS

Slingshot

Cyborg Hawk

bugtraq

Commando


    'Vulnerable' VMs
Metasploitable3

Metasploitable2

PentestBox

DVWA

Kioptrix




    With great power, comes great responsibility; this material has been collated to encouraging learning and development, and not to be leveraged for unethical and/or illegal behaviour.

    I would like to thank all of the authors, instructors, publishers, developers (and others) - both individuals and teams - for the content collated on this site.

    I must stress that none of the content contained on this site of my own, I have simply brought together material utilised from my career as well as additional reference material, to a single site.