Loading...
Browse 349 red team tools
Automated ransomware attack emulation platform for defense validation
Automated ransomware attack emulation platform for defense validation
Threat emulation tool for adversary simulations and red team operations
Threat emulation tool for adversary simulations and red team operations
MCP server enabling AI agents to autonomously run 150+ security tools
MCP server enabling AI agents to autonomously run 150+ security tools
Penetration testing software for simulating attacks and validating vulnerabilities
Penetration testing software for simulating attacks and validating vulnerabilities
Cybersecurity services provider offering pentesting, red teaming, and SOC/CSIRT
Cybersecurity services provider offering pentesting, red teaming, and SOC/CSIRT
All-in-one platform for vuln mgmt, red team ops, and attack surface mgmt
All-in-one platform for vuln mgmt, red team ops, and attack surface mgmt
AI security assurance platform for red-teaming, guardrails & compliance
AI security assurance platform for red-teaming, guardrails & compliance
End-to-end platform for securing AI systems across their entire lifecycle
End-to-end platform for securing AI systems across their entire lifecycle
AI trust infrastructure platform for securing GenAI apps & workforce usage
AI trust infrastructure platform for securing GenAI apps & workforce usage
European AI security agency offering consulting, red teaming & governance services
European AI security agency offering consulting, red teaming & governance services
A comprehensive guide on utilizing advanced SSH tunneling techniques for network penetration testing and red team engagements, with a focus on Windows environments and firewall bypass methods.
A comprehensive guide on utilizing advanced SSH tunneling techniques for network penetration testing and red team engagements, with a focus on Windows environments and firewall bypass methods.
A C++ staged shellcode loader with evasion capabilities, compatible with Sliver and other shellcode sources, designed for offensive security testing.
A C++ staged shellcode loader with evasion capabilities, compatible with Sliver and other shellcode sources, designed for offensive security testing.
A visual guide that maps attack vectors and exploitation techniques for identifying vulnerabilities in GitHub Actions configurations and CI/CD pipelines.
A visual guide that maps attack vectors and exploitation techniques for identifying vulnerabilities in GitHub Actions configurations and CI/CD pipelines.
A comprehensive repository of red teaming resources including cheatsheets, detailed notes, automation scripts, and practice platforms covering multiple cybersecurity domains.
A comprehensive repository of red teaming resources including cheatsheets, detailed notes, automation scripts, and practice platforms covering multiple cybersecurity domains.
AI security platform for red teaming AI agents, GenAI apps, and ML models
AI security platform for red teaming AI agents, GenAI apps, and ML models
AI security platform for testing, defending, and monitoring GenAI apps & agents
AI security platform for testing, defending, and monitoring GenAI apps & agents
AI security testing platform for red teaming, vulnerability assessment & defense
AI security testing platform for red teaming, vulnerability assessment & defense
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.
ESC is an interactive .NET SQL console client with enhanced SQL Server discovery and data exfiltration features designed for penetration testing and red team engagements.
ESC is an interactive .NET SQL console client with enhanced SQL Server discovery and data exfiltration features designed for penetration testing and red team engagements.
C3 is a framework by WithSecureLabs for rapid prototyping of custom command and control channels that integrates with existing offensive security toolkits.
C3 is a framework by WithSecureLabs for rapid prototyping of custom command and control channels that integrates with existing offensive security toolkits.
Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
Skyhook is an HTTP-based file transfer tool that uses obfuscation techniques to evade detection by Intrusion Detection Systems.
Skyhook is an HTTP-based file transfer tool that uses obfuscation techniques to evade detection by Intrusion Detection Systems.
A cloud-focused attack simulation framework that provides granular, self-contained offensive techniques mapped to MITRE ATT&CK for red team exercises.
A cloud-focused attack simulation framework that provides granular, self-contained offensive techniques mapped to MITRE ATT&CK for red team exercises.
Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.
Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance