Find practical notes and resources on red teaming and offensive security to support learning, research, and hands-on cybersecurity activities.
Explore practical red teaming and security notes
ired.team is a collection of practical notes and resources focused on red teaming and offensive security. Whether you're a cybersecurity professional, student, or enthusiast, you'll find a variety of topics covering tools, techniques, and best practices for security testing and defense.
You can use the site to quickly look up information, learn new methods, or refresh your knowledge on offensive security concepts. The notes are organized for easy searching, making it a handy reference for anyone interested in ethical hacking or penetration testing.
The site is designed to be straightforward and accessible, helping you find relevant security insights and tips without the clutter. If you're looking to deepen your understanding of red teaming, ired.team is a useful resource to keep bookmarked.
Discover websites similar to Ired.team. Section 1 prioritizes sites with matching domain extensions and/or languages. Section 2 offers worldwide alternatives.
Browse a curated list of Unix binaries that can help bypass local security restrictions in misconfigured systems. Useful for security testing and research.
Explore a comprehensive database of public exploits, shellcode, and security research for ethical hacking, penetration testing, and cybersecurity learning.
Personal site of Moritz Lipp, security researcher, sharing research on microarchitectural attacks, open-source projects, publications, and presentations.
Phrack Magazine shares articles, research, and news about hacking, cybersecurity, and digital underground topics for tech enthusiasts and researchers.
MalwareBazaar lets you search, share, and download malware samples for research and threat analysis. Designed for cybersecurity professionals and researchers.
Explore offensive security tools and in-depth research to support your red teaming and cybersecurity testing activities. Resources for security professionals.
Explore and learn about Kali Linux's suite of penetration testing and ethical hacking tools, complete with documentation and community support.
Browse and search archives of top security and hacking mailing lists, featuring real-time updates, message excerpts, and easy RSS access.
Klikki shares insights on web security, bug bounties, and real-world vulnerabilities, featuring detailed reports on exploits and security issues.
Aircrack-ng offers a suite of tools for testing and analyzing WiFi network security, with downloads, documentation, and community support.
VulnHub offers free downloadable vulnerable virtual machines for hands-on cybersecurity training, helping you practice ethical hacking and security skills.
Learn about Trojan Source attacks—how invisible vulnerabilities can be injected into source code through encoding tricks, and how to defend against them.
Metasploit lets you test security by finding vulnerabilities and managing security assessments. Download penetration testing tools or learn how to use them.
Hak5 offers pentesting tools, hacking tutorials, and a welcoming security community for cybersecurity pros, students, and red teams. Established in 2005.
Kitploit shares cybersecurity tools and resources for penetration testing, ethical hacking, and security research. Currently under maintenance.
Learn about the Sweet32 cryptographic attack and its impact on 64-bit block ciphers used in protocols like TLS and OpenVPN. Security insights included.
BlackArch Linux offers a lightweight, Arch-based operating system with thousands of penetration testing and cybersecurity tools for security professionals.
Google CTF is an online cybersecurity competition where you solve security challenges, test your hacking skills, and learn about digital security.
Learn about Thunderbolt 3 security risks, view demos, and access tools to check if your device is vulnerable to Thunderspy attacks and how to protect it.
Learn about the Heartbleed Bug, a major security flaw in OpenSSL that exposed encrypted data. Find details, risks, and how to protect your information.
Explore open-source intelligence and cyber security tools, research, and resources focused on offensive OSINT techniques and surveillance insights.
Explore detailed guides and references for the Julia programming language, designed for high-performance scientific and numerical computing.
Find help, downloads, and answers for Nexvoo products on this support site. Access resources and get assistance for setup, troubleshooting, and more.
Dgraph is a scalable graph database platform for building and managing knowledge graphs, supporting real-time, terabyte-scale data applications.
Find official information about the discontinuation of Google Wave, including shutdown details and support resources, on this Google Help page.
Find help and support for Microsoft products. Search articles, get troubleshooting tips, and connect with the Microsoft support community.
Learn how to set up Git for your computer with clear, step-by-step guides from GitHub Docs. Get started with version control and manage your code easily.
Find easy-to-follow tech guides, tutorials, and computer help for all skill levels on this resource-packed website.
Defines clear principles for open data and content, helping users understand and apply openness standards in various languages.
Browse comprehensive Linux documentation, guides, and man pages to help you understand and use Linux commands, tools, and features with ease.
Explore legal and ethical hacking, security advisories, and independent research focused on information security and vulnerability disclosures.
Vulnerability Lab shares research on security vulnerabilities, bug bounty programs, and responsible disclosure for ethical hackers and researchers.
Packet Storm offers cybersecurity news, tools, exploits, advisories, and whitepapers for security professionals and enthusiasts to stay updated and informed.
Irongeek.com offers tutorials, articles, and videos on information security, hacking, and pen-testing, helping users learn about cybersecurity topics and tools.
Learn about KRACK, a major Wi-Fi security vulnerability, with clear explanations, research papers, demos, and tools focused on WPA2 protocol weaknesses.
Eclectic site offering internet and computer security resources, breach info, commentary, and archives for security enthusiasts and researchers.
System Weakness publishes articles and guides on cybersecurity, ethical hacking, and infosec, helping readers learn about security and vulnerabilities.
A Chinese-language forum for software reverse engineering, cybersecurity, and sharing technical knowledge among enthusiasts and professionals.
Find open source software licenses explained in simple, plain English so you can quickly understand terms, permissions, and requirements before using code.
Scientist Michael Nielsen shares projects, writings, and resources on quantum computing, AI, and tools that help people think and create.