Security-List is a comprehensive, categorized knowledge base and index for red team tools, vulnerability scanners, and security training resources.
If you have any good suggestions or comments during the search process, please feedback some index experience in issues. Thank you for your participation.查阅过程中,如果有什么好的意见或建议,请在Issues反馈,感谢您的参与。
This repository serves as a detailed documentation and reference guide for penetration testers, red teamers, and security researchers to explore and learn about a wide range of security tools and techniques. It is ideal for users seeking organized knowledge across the entire red team attack lifecycle, including exploitation, lateral movement, persistence, and defense strategies.
This project is intended solely for educational and research purposes in compliance with Chinese cybersecurity laws; users bear all risks related to tool usage. The repository is large and continuously updated, with frequently changing content separated into categories for easier navigation. Users are encouraged to provide feedback and suggestions via GitHub issues to improve the index experience.
This repository is a documentation and knowledge base; no installation is required.
Clone the repository using: git clone https://github.com/euphrat1ca/security_w1k1.git
Access the documentation locally or visit the online index at https://euphrat1ca.github.io/security_w1k1/