RedHunt OS aims to be a one stop shop for all your threat emulation and threat hunting needs by integrating attacker's arsenal as well as defender's toolkit to actively identify the threats in your environment. Base Machine: Lubuntu-18.04 x64 Tool Setup: Caldera Atomic Red Team Nmap CrackMapExec Metasploit Responder Zap ADRecon Threat HUNTing: Kolide Fleet ELK (Elasticsearch, Logstash, and Kibana) Stack Open Source Intelligence (OSINT): Maltego Recon-ng Datasploit theHarvestor Threat Intelligence: Yeti Harpoon Reporting: Asciinema Flameshot CherryTree VM Download Link: Release v2: http://bit.ly/RedHunt-OS-v2
FEATURES
ALTERNATIVES
Provides advanced external threat intelligence to help organizations proactively identify and mitigate potential security threats.
FireEye Mandiant SunBurst Countermeasures: freely available rules for detecting malicious files and activity
A comprehensive list of IP addresses for cybersecurity purposes, including threat intelligence, incident response, and security research.
A nonprofit security organization that collects and shares threat data to make the Internet more secure.
Malware Patrol offers a range of threat intelligence solutions, including enterprise data feeds, DNS firewall, phishing threat intelligence, and small business protection.
A threat hunting tool for Windows event logs to detect APT movements and decrease the time to uncover suspicious activity.
Intelligence feeds for cybersecurity professionals to stay informed about emerging threats and trends.
Unified repository for Microsoft Sentinel and Microsoft 365 Defender containing security content, detections, queries, playbooks, and resources to secure environments and hunt for threats.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.