RedHunt OS aims to be a one stop shop for all your threat emulation and threat hunting needs by integrating attacker's arsenal as well as defender's toolkit to actively identify the threats in your environment. Base Machine: Lubuntu-18.04 x64 Tool Setup: Caldera Atomic Red Team Nmap CrackMapExec Metasploit Responder Zap ADRecon Threat HUNTing: Kolide Fleet ELK (Elasticsearch, Logstash, and Kibana) Stack Open Source Intelligence (OSINT): Maltego Recon-ng Datasploit theHarvestor Threat Intelligence: Yeti Harpoon Reporting: Asciinema Flameshot CherryTree VM Download Link: Release v2: http://bit.ly/RedHunt-OS-v2
FEATURES
ALTERNATIVES
Vectra AI offers an AI-driven Attack Signal Intelligence platform that uses advanced machine learning to detect and respond to cyber threats across hybrid cloud environments.
Yara rule generator using VirusTotal code similarity feature code-similar-to.
Signature-based YARA rules for detecting and preventing threats within Linux, Windows, and macOS systems.
PolySwarm is a malware intelligence marketplace that aggregates threat detection engines to provide early detection, unique samples, and higher accuracy.
A tool for fetching and visualizing cyber threat intelligence data with Elasticsearch and Kibana integration.
PINNED

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

OSINTLeak
OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.