Loading...
Task: Red Team
Browse 110 security tools
Managed Red Team service simulating real attacks to test security defenses
Managed Red Team service simulating real attacks to test security defenses
Red team exercises simulating real-world attacks to identify vulnerabilities
Red team exercises simulating real-world attacks to identify vulnerabilities
Simulated adversarial attack service to test organizational defenses
Simulated adversarial attack service to test organizational defenses
Red team attack simulation service for testing security controls and IR plans
Red team attack simulation service for testing security controls and IR plans
3-day Metasploit training course focused on Ruby scripting & custom modules
3-day Metasploit training course focused on Ruby scripting & custom modules
5-day training bootcamp on advanced persistence and data exfiltration techniques
5-day training bootcamp on advanced persistence and data exfiltration techniques
Offensive security services with penetration testing and vulnerability assessments
Offensive security services with penetration testing and vulnerability assessments
Red teaming service simulating real-world adversary attacks on organizations.
Red teaming service simulating real-world adversary attacks on organizations.
Red team service simulating nation-state threats to test defenses.
Red team service simulating nation-state threats to test defenses.
Ransomware attack simulation service to test security defenses and response
Ransomware attack simulation service to test security defenses and response
Subscription-based continuous red team testing across digital, physical & social
Subscription-based continuous red team testing across digital, physical & social
Red teaming service that emulates real-world adversaries to test defenses
Red teaming service that emulates real-world adversaries to test defenses
Threat emulation tool for adversary simulations and red team operations
Threat emulation tool for adversary simulations and red team operations
MCP server enabling AI agents to autonomously run 150+ security tools
MCP server enabling AI agents to autonomously run 150+ security tools
A C++ staged shellcode loader with evasion capabilities, compatible with Sliver and other shellcode sources, designed for offensive security testing.
A C++ staged shellcode loader with evasion capabilities, compatible with Sliver and other shellcode sources, designed for offensive security testing.
A comprehensive repository of red teaming resources including cheatsheets, detailed notes, automation scripts, and practice platforms covering multiple cybersecurity domains.
A comprehensive repository of red teaming resources including cheatsheets, detailed notes, automation scripts, and practice platforms covering multiple cybersecurity domains.
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.
ESC is an interactive .NET SQL console client with enhanced SQL Server discovery and data exfiltration features designed for penetration testing and red team engagements.
ESC is an interactive .NET SQL console client with enhanced SQL Server discovery and data exfiltration features designed for penetration testing and red team engagements.
C3 is a framework by WithSecureLabs for rapid prototyping of custom command and control channels that integrates with existing offensive security toolkits.
C3 is a framework by WithSecureLabs for rapid prototyping of custom command and control channels that integrates with existing offensive security toolkits.
Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
Skyhook is an HTTP-based file transfer tool that uses obfuscation techniques to evade detection by Intrusion Detection Systems.
Skyhook is an HTTP-based file transfer tool that uses obfuscation techniques to evade detection by Intrusion Detection Systems.
A cloud-focused attack simulation framework that provides granular, self-contained offensive techniques mapped to MITRE ATT&CK for red team exercises.
A cloud-focused attack simulation framework that provides granular, self-contained offensive techniques mapped to MITRE ATT&CK for red team exercises.
Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.
Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.
Get strategic cybersecurity insights in your inbox
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs