RedHunt Linux Distribution (VM) v2 Logo

RedHunt Linux Distribution (VM) v2

A Linux distribution designed for threat emulation and threat hunting, integrating attacker and defender tools for identifying threats in your environment.

1,294
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

RedHunt Linux Distribution (VM) v2 Description

RedHunt OS aims to be a one stop shop for all your threat emulation and threat hunting needs by integrating attacker's arsenal as well as defender's toolkit to actively identify the threats in your environment. Base Machine: Lubuntu-18.04 x64 Tool Setup: Caldera Atomic Red Team Nmap CrackMapExec Metasploit Responder Zap ADRecon Threat HUNTing: Kolide Fleet ELK (Elasticsearch, Logstash, and Kibana) Stack Open Source Intelligence (OSINT): Maltego Recon-ng Datasploit theHarvestor Threat Intelligence: Yeti Harpoon Reporting: Asciinema Flameshot CherryTree VM Download Link: Release v2: http://bit.ly/RedHunt-OS-v2

RedHunt Linux Distribution (VM) v2 FAQ

Common questions about RedHunt Linux Distribution (VM) v2 including features, pricing, alternatives, and user reviews.

RedHunt Linux Distribution (VM) v2 is A Linux distribution designed for threat emulation and threat hunting, integrating attacker and defender tools for identifying threats in your environment.. It is a Security Operations solution designed to help security teams with Osint, Cyber Threat Intelligence.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

ShadowDragon Horizon Platform Logo

Enterprise OSINT platform for identity, investigation, and threat monitoring.

0
ShadowDragon Horizon Monitor Logo

Continuous OSINT monitoring platform tracking identities, keywords & topics.

0
OSINT Omnibus Logo

An interactive command line application for Open Source Intelligence collection and artifact management that enables investigation of IP addresses, domains, email addresses, file hashes, and other digital artifacts.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox