Red Teaming Toolkit Logo

Red Teaming Toolkit

0
Free
Visit Website

This repository contains cutting-edge open-source security tools (OST) that will help you during adversary simulation and as information intended for threat hunter can make detection and prevention control easier. The list of tools below that could be potentially misused by threat actors such as APT and Human-Operated Ransomware (HumOR). If you want to contribute to this list send me a pull request. Table of Contents Reconnaissance Initial Access Delivery Situational Awareness Credential Dumping Privilege Escalation Defense Evasion Persistence Lateral Movement Exfiltration Miscellaneous

FEATURES

ALTERNATIVES

Tool for exploiting Sixnet RTUs to gain root level access with little effort.

SauronEye helps in identifying files containing sensitive data such as passwords through targeted directory searches.

AEM (Adobe Experience Manager) Hacker is a tool designed to help security researchers and penetration testers identify and exploit vulnerabilities in AEM-based systems.

A Ruby framework designed to aid in the penetration testing of WordPress systems.

A black-box obfuscation tool for Android apps with Android App Bundle support.

GraphSpy is a token management tool that allows users to store and manage access and refresh tokens for multiple users and scopes in one location.

LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.

Generates randomized C2 profiles for Cobalt Strike to evade detection.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved