Red Team Automation (RTA) Logo

Red Team Automation (RTA)

0
Free
Visit Website

RTA provides a framework of scripts designed to allow blue teams to test their detection capabilities against malicious tradecraft, modeled after MITRE ATT&CK. RTA is composed of python scripts that generate evidence of over 50 different ATT&CK tactics, as well as a compiled binary application that performs activities such as file timestopping, process injections, and beacon simulation as needed. Where possible, RTA attempts to perform the actual malicious activity described. In other cases, the RTAs will emulate all or parts of the activity. For example, some lateral movement will by default target local host (though with parameters typically allow for multi-host testing). In other cases, executables such as cmd.exe or python.exe will be renamed to make it appear as if a Windows binary is doing non-standard activities. Installation Prerequisites: Python2.7 Installation Steps: Download a copy of the RTA repo from https://github.com/endgameinc/RTA. Extract the contents of the zip archive into an RTA folder, such as c:\RTA. For the full experience, download additional files into the bin subdirectory (as described in the dependencies section below). Dependencies:

FEATURES

ALTERNATIVES

A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.

Exploiting WordPress With Metasploit, containing 45 modules for exploits and auxiliaries.

SharpEDRChecker scans system components to detect security products and tools.

A tool that finds more information about a given URL or domain by querying multiple data sources.

AEM (Adobe Experience Manager) Hacker is a tool designed to help security researchers and penetration testers identify and exploit vulnerabilities in AEM-based systems.

A collaborative, multi-platform, red teaming framework for simulating attacks and testing defenses.

A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.

A customized Kali Linux distribution for ICS/SCADA pentesting professionals