Red Team Automation (RTA) Logo

Red Team Automation (RTA)

0
Free
Visit Website

RTA provides a framework of scripts designed to allow blue teams to test their detection capabilities against malicious tradecraft, modeled after MITRE ATT&CK. RTA is composed of python scripts that generate evidence of over 50 different ATT&CK tactics, as well as a compiled binary application that performs activities such as file timestopping, process injections, and beacon simulation as needed. Where possible, RTA attempts to perform the actual malicious activity described. In other cases, the RTAs will emulate all or parts of the activity. For example, some lateral movement will by default target local host (though with parameters typically allow for multi-host testing). In other cases, executables such as cmd.exe or python.exe will be renamed to make it appear as if a Windows binary is doing non-standard activities. Installation Prerequisites: Python2.7 Installation Steps: Download a copy of the RTA repo from https://github.com/endgameinc/RTA. Extract the contents of the zip archive into an RTA folder, such as c:\RTA. For the full experience, download additional files into the bin subdirectory (as described in the dependencies section below). Dependencies:

FEATURES

ALTERNATIVES

RedWarden is a Cobalt Strike C2 Reverse proxy that evades detection by Blue Teams, AVs, EDRs, and scanners through packet inspection and malleable profile correlation.

A Python utility to takeover domains vulnerable to AWS NS Takeover

Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.

A collection of resources for practicing penetration testing

A set of commands for exploit developers and reverse-engineers to enhance GDB functionality.

Ebowla is a tool for generating payloads in Python, GO, and PowerShell with support for Reflective DLLs.

Collection of Return-Oriented Programming challenges for practicing exploitation skills.

A post-exploitation framework for attacking running AWS infrastructure

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved