Tools and Techniques for Red Team / Penetration Testing
-
Updated
Aug 8, 2023
Tools and Techniques for Red Team / Penetration Testing
🐢 Open-Source Evaluation & Testing for AI & LLM systems
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and engineers to proactively identify risks in generative AI systems.
该工具用于导出正在运行中的微信进程的 key 并自动解密所有微信数据库文件以及导出 key 后数据库文件离线解密。
Sandman is a NTP based backdoor for red team engagements in hardened networks.
Venom is a library that meant to perform evasive communication using stolen browser socket
Nimbo-C2 is yet another (simple and lightweight) C2 framework
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
Compiled tools for internal assessments
Generic PE loader for fast prototyping evasion techniques
Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
Spoofing desktop login applications with WinForms and WPF
Self-hosted passive subdomain continous monitoring tool.
smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares
Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations
Repo containing cracked red teaming tools.
A fast and comprehensive tool for organizational network scanning
Persistent Powershell backdoor tool {😈}
Add a description, image, and links to the red-team-tools topic page so that developers can more easily learn about it.
To associate your repository with the red-team-tools topic, visit your repo's landing page and select "manage topics."