Tools and Techniques for Red Team / Penetration Testing
-
Updated
Aug 8, 2023
Tools and Techniques for Red Team / Penetration Testing
🐢 Open-Source Evaluation & Testing for LLMs and ML models
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
The Python Risk Identification Tool for generative AI (PyRIT) is an open access automation framework to empower security professionals and machine learning engineers to proactively find risks in their generative AI systems.
Sandman is a NTP based backdoor for red team engagements in hardened networks.
Venom is a library that meant to perform evasive communication using stolen browser socket
该工具用于导出正在运行中的微信进程的 key 并自动解密所有微信数据库文件以及导出 key 后数据库文件离线解密。
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
Nimbo-C2 is yet another (simple and lightweight) C2 framework
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Compiled tools for internal assessments
The best and completely open source Stealer
Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
Self-hosted passive subdomain continous monitoring tool.
smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares
Generic PE loader for fast prototyping evasion techniques
A fast and comprehensive tool for organizational network scanning
A command-line interface (CLI) based passive subdomain discovery utility. It is designed to efficiently identify known subdomains of given domains by tapping into a multitude of curated online passive sources.
Persistent Powershell backdoor tool {😈}
Repo containing cracked red teaming tools.
Add a description, image, and links to the red-team-tools topic page so that developers can more easily learn about it.
To associate your repository with the red-team-tools topic, visit your repo's landing page and select "manage topics."