Red-Teaming-Toolkit

Red-Teaming-Toolkit

强化渗透测试和威胁模拟的开源资源库

Red-Teaming-Toolkit收集了众多开源安全工具,涵盖红队行动全流程。从侦察到数据窃取,包括Cobalt Strike等C2框架,为渗透测试提供全面支持。该项目既有助于红队提升技能,也为蓝队优化防御策略提供参考,是一个兼顾攻防的综合性安全资源库。

红队工具包开源安全工具对抗模拟威胁检测渗透测试Github开源项目

Red Teaming Toolkit

This repository contains cutting-edge open-source security tools (OST) that will help you during adversary simulation and as information intended for threat hunter can make detection and prevention control easier. The list of tools below that could be potentially misused by threat actors such as APT and Human-Operated Ransomware (HumOR). If you want to contribute to this list send me a pull request.


Table of Contents


Reconnaissance

NameDescriptionURL
RustScanThe Modern Port Scanner. Find ports quickly (3 seconds at its fastest). Run scripts through our scripting engine (Python, Lua, Shell supported).https://github.com/RustScan/RustScan
AmassIn-depth Attack Surface Mapping and Asset Discoveryhttps://github.com/OWASP/Amass
gitleaksGitleaks is a SAST tool for detecting hardcoded secrets like passwords, api keys, and tokens in git repos.https://github.com/zricethezav/gitleaks
S3ScannerScan for open S3 buckets and dump the contentshttps://github.com/sa7mon/S3Scanner
cloud_enumMulti-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.https://github.com/initstring/cloud_enum
Recon-ngOpen Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.https://github.com/lanmaster53/recon-ng
busterAn advanced tool for email reconnaissancehttps://github.com/sham00n/buster
linkedin2usernameOSINT Tool: Generate username lists for companies on LinkedInhttps://github.com/initstring/linkedin2username
WitnessMeWeb Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier.https://github.com/byt3bl33d3r/WitnessMe
pagodopagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searchinghttps://github.com/opsdisk/pagodo
AttackSurfaceMapperAttackSurfaceMapper is a tool that aims to automate the reconnaissance process.https://github.com/superhedgy/AttackSurfaceMapper
SpiderFootSpiderFoot is an open source intelligence (OSINT) automation tool. It integrates with just about every data source available and utilises a range of methods for data analysis, making that data easy to navigate.https://github.com/smicallef/spiderfoot
dnscandnscan is a python wordlist-based DNS subdomain scanner.https://github.com/rbsec/dnscan
spoofcheckA program that checks if a domain can be spoofed from. The program checks SPF and DMARC records for weak configurations that allow spoofing.https://github.com/BishopFox/spoofcheck
LinkedIntLinkedIn Recon Toolhttps://github.com/vysecurity/LinkedInt
BBOTRecursive internet scanner inspired by Spiderfoot, but designed to be faster, more reliable, and friendlier to pentesters, bug bounty hunters, and developers.https://github.com/blacklanternsecurity/bbot

Initial Access

Brute Force

NameDescriptionURL
SprayingToolkitScripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficienthttps://github.com/byt3bl33d3r/SprayingToolkit
o365reconRetrieve information via O365 with a valid credhttps://github.com/nyxgeek/o365recon
CredMasterRefactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttlinghttps://github.com/knavesec/CredMaster

Payload Development

NameDescriptionURL
IvyIvy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory.https://github.com/optiv/Ivy
PEzorOpen-Source PE Packerhttps://github.com/phra/PEzor
GadgetToJScriptA tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA scripts.https://github.com/med0x2e/GadgetToJScript
ScareCrowPayload creation framework designed around EDR bypass.https://github.com/optiv/ScareCrow
DonutDonut is a position-independent code that enables in-memory execution of VBScript, JScript, EXE, DLL files and dotNET assemblies.https://github.com/TheWover/donut
MystikalmacOS Initial Access Payload Generatorhttps://github.com/D00MFist/Mystikal
charlottec++ fully undetected shellcode launcher ;)https://github.com/9emin1/charlotte
InvisibilityCloakProof-of-concept obfuscation toolkit for C# post-exploitation tools. This will perform the below actions for a C# visual studio project.https://github.com/xforcered/InvisibilityCloak
DendrobateDendrobate is a framework that facilitates the development of payloads that hook unmanaged code through managed .NET code.https://github.com/FuzzySecurity/Dendrobate
Offensive VBA and XLS EntanglementThis repo provides examples of how VBA can be used for offensive purposes beyond a simple dropper or shell injector. As we develop more use cases, the repo will be updated.https://github.com/BC-SECURITY/Offensive-VBA-and-XLS-Entanglement
xlsGenTiny Excel BIFF8 Generator, to Embedded 4.0 Macros in *.xlshttps://github.com/aaaddress1/xlsGen
darkarmourWindows AV Evasionhttps://github.com/bats3c/darkarmour
InlineWhispersTool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)https://github.com/outflanknl/InlineWhispers
EvilClippyA cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.https://github.com/outflanknl/EvilClippy
OfficePurgeVBA purge your Office documents with OfficePurge. VBA purging removes P-code from module streams within Office documents.https://github.com/fireeye/OfficePurge
ThreatCheckIdentifies the bytes that Microsoft Defender / AMSI Consumer flags on.https://github.com/rasta-mouse/ThreatCheck
CrossC2Generate CobaltStrike's cross-platform payloadhttps://github.com/gloxec/CrossC2
RulerRuler is a tool that allows you to interact with Exchange servers remotely, through either the MAPI/HTTP or RPC/HTTP protocol.https://github.com/sensepost/ruler
DueDLLigenceShellcode runner framework for application whitelisting bypasses and DLL side-loading. The shellcode included in this project spawns calc.exe.https://github.com/fireeye/DueDLLigence
RuralBishopRuralBishop is practically a carbon copy of UrbanBishop by b33f, but all P/Invoke calls have been replaced with D/Invoke.https://github.com/rasta-mouse/RuralBishop
TikiTorchTikiTorch was named in homage to CACTUSTORCH by Vincent Yiu. The basic concept of CACTUSTORCH is that it spawns a new process, allocates a region of memory, then uses CreateRemoteThread to run the desired shellcode within that target process. Both the process and shellcode are specified by the user.https://github.com/rasta-mouse/TikiTorch
SharpShooterSharpShooter is a payload creation framework for the retrieval and execution of arbitrary CSharp source code. SharpShooter is capable of creating payloads in a variety of formats, including HTA, JS, VBS and WSF.https://github.com/mdsecactivebreach/SharpShooter
SharpSploitSharpSploit is a .NET post-exploitation library written in C#https://github.com/cobbr/SharpSploit
MSBuildAPICallerMSBuild Without MSBuild.exehttps://github.com/rvrsh3ll/MSBuildAPICaller
macro_packmacro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of MS Office documents, VB scripts, and other formats for pentest, demo, and social engineering assessments.https://github.com/sevagas/macro_pack
inceptorTemplate-Driven AV/EDR Evasion Frameworkhttps://github.com/klezVirus/inceptor
mortarevasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)https://github.com/0xsp-SRD/mortar
ProtectMyToolingMulti-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it with your implant, it does a lot of sneaky things and spits out obfuscated executable.https://github.com/mgeeky/ProtectMyTooling
FreezeFreeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methodshttps://github.com/optiv/Freeze
ShhhloaderShhhloader is a work in progress shellcode loader. It takes raw shellcode as input and compiles a C++ stub that does a bunch of different things to try and bypass AV/EDRhttps://github.com/icyguider/Shhhloader

Delivery

Phishing

NameDescriptionURL
o365-attack-toolkitA toolkit to attack Office365https://github.com/mdsecactivebreach/o365-attack-toolkit
Evilginx2Evilginx2 is a man-in-the-middle attack framework used for phishing credentials and session cookies of any web service.https://github.com/kgretzky/evilginx2
GophishGophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness training.https://github.com/gophish/gophish
PwnAuthPwnAuth a web application framework for launching and managing OAuth abuse campaigns.https://github.com/fireeye/PwnAuth
ModlishkaModlishka is a flexible and powerful reverse proxy, that will take your ethical phishing campaigns to the next level.https://github.com/drk1wi/Modlishka

Watering Hole Attack

NameDescriptionURL
BeEFBeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browserhttps://github.com/beefproject/beef

Command and Control

Remote Access Tools (RAT)

NameDescriptionURL
Cobalt StrikeCobalt Strike is software for Adversary Simulations and Red Team Operations.https://cobaltstrike.com/
SpecterInsightSpecterInsight is a cross-platform, post-exploitation command and control framework based on .NET for red team engagements, threat emulation, and training. It provides a variety of obfuscated payloads out-of-the-box and makes avoiding detection a core feature. Command outout is returned in JSON format and exported to ELK for analysis of operations with pre-built dashboards.https://practicalsecurityanalytics.com/specterinsight/
Brute Ratel C4Brute Ratel is the most advanced Red Team & Adversary Simulation Software in the current C2 Market.https://bruteratel.com/
EmpireEmpire 5 is a post-exploitation framework that includes a pure-PowerShell Windows agent, and compatibility with Python 3.x Linux/OS X agents.https://github.com/BC-SECURITY/Empire
PoshC2PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral movement.https://github.com/nettitude/PoshC2
KoadicKoadic C3 COM Command & Control - JScript RAThttps://github.com/zerosum0x0/koadic
merlinMerlin is a cross-platform post-exploitation Command & Control server and agent written in Go.https://github.com/Ne0nd0g/merlin
MythicA cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI.https://github.com/its-a-feature/Mythic
CovenantCovenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers.https://github.com/cobbr/Covenant
shad0wA post exploitation framework designed to operate covertly on heavily monitored environmentshttps://github.com/bats3c/shad0w
SliverSliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS.https://github.com/BishopFox/sliver
SILENTTRINITYAn asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLRhttps://github.com/byt3bl33d3r/SILENTTRINITY
PupyPupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in pythonhttps://github.com/n1nj4sec/pupy
HavocHavoc is a modern and malleable post-exploitation command and control framework, created by @C5pider.https://github.com/HavocFramework/Havoc
NimPlantA light first-stage C2 implant written in Nim and Pythonhttps://github.com/chvancooten/NimPlant
SharpC2SharpC2 is a Command & Control (C2) framework written in C#. It consists of an ASP.NET Core Team Server, a .NET Framework implant, and a .NET MAUI client.https://github.com/rasta-mouse/SharpC2

Staging

NameDescriptionURL
pwndropSelf-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.https://github.com/kgretzky/pwndrop
C2concealerA command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.https://github.com/FortyNorthSecurity/C2concealer
FindFrontableDomainsSearch for potential frontable domainshttps://github.com/rvrsh3ll/FindFrontableDomains
Domain HunterChecks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain nameshttps://github.com/threatexpress/domainhunter
RedWardenFlexible CobaltStrike Malleable Redirectorhttps://github.com/mgeeky/RedWarden
AzureC2RelayAzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt Strike Malleable C2 profile.https://github.com/Flangvik/AzureC2Relay
C3C3 (Custom Command and Control) is a tool that allows Red Teams to rapidly develop and utilise esoteric command and control channels (C2).https://github.com/FSecureLABS/C3
ChameleonA tool for evading Proxy categorisationhttps://github.com/mdsecactivebreach/Chameleon
Cobalt Strike Malleable C2 Design and Reference GuideCobalt Strike Malleable C2 Design and Reference Guidehttps://github.com/threatexpress/malleable-c2/
redirect.rulesQuick and dirty dynamic redirect.rules generatorhttps://github.com/0xZDH/redirect.rules
CobaltBusCobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebushttps://github.com/Flangvik/CobaltBus
SourcePointSourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.https://github.com/Tylous/SourcePoint
RedGuardRedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.https://github.com/wikiZ/RedGuard
skyhookA round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.https://github.com/blackhillsinfosec/skyhook
GraphStrikeCobalt Strike HTTPS beaconing over Microsoft Graph APIhttps://github.com/RedSiege/GraphStrike

Log Aggregation

NameDescriptionURL
RedELKRed Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.https://github.com/outflanknl/RedELK
Elastic for Red TeamingRepository of resources for configuring a Red Team SIEM using Elastic.https://github.com/SecurityRiskAdvisors/RedTeamSIEM
RedEyeRedEye is a visual analytic

编辑推荐精选

Vora

Vora

免费创建高清无水印Sora视频

Vora是一个免费创建高清无水印Sora视频的AI工具

Refly.AI

Refly.AI

最适合小白的AI自动化工作流平台

无需编码,轻松生成可复用、可变现的AI自动化工作流

酷表ChatExcel

酷表ChatExcel

大模型驱动的Excel数据处理工具

基于大模型交互的表格处理系统,允许用户通过对话方式完成数据整理和可视化分析。系统采用机器学习算法解析用户指令,自动执行排序、公式计算和数据透视等操作,支持多种文件格式导入导出。数据处理响应速度保持在0.8秒以内,支持超过100万行数据的即时分析。

AI工具酷表ChatExcelAI智能客服AI营销产品使用教程
TRAE编程

TRAE编程

AI辅助编程,代码自动修复

Trae是一种自适应的集成开发环境(IDE),通过自动化和多元协作改变开发流程。利用Trae,团队能够更快速、精确地编写和部署代码,从而提高编程效率和项目交付速度。Trae具备上下文感知和代码自动完成功能,是提升开发效率的理想工具。

AI工具TraeAI IDE协作生产力转型热门
AIWritePaper论文写作

AIWritePaper论文写作

AI论文写作指导平台

AIWritePaper论文写作是一站式AI论文写作辅助工具,简化了选题、文献检索至论文撰写的整个过程。通过简单设定,平台可快速生成高质量论文大纲和全文,配合图表、参考文献等一应俱全,同时提供开题报告和答辩PPT等增值服务,保障数据安全,有效提升写作效率和论文质量。

AI辅助写作AI工具AI论文工具论文写作智能生成大纲数据安全AI助手热门
博思AIPPT

博思AIPPT

AI一键生成PPT,就用博思AIPPT!

博思AIPPT,新一代的AI生成PPT平台,支持智能生成PPT、AI美化PPT、文本&链接生成PPT、导入Word/PDF/Markdown文档生成PPT等,内置海量精美PPT模板,涵盖商务、教育、科技等不同风格,同时针对每个页面提供多种版式,一键自适应切换,完美适配各种办公场景。

AI办公办公工具AI工具博思AIPPTAI生成PPT智能排版海量精品模板AI创作热门
潮际好麦

潮际好麦

AI赋能电商视觉革命,一站式智能商拍平台

潮际好麦深耕服装行业,是国内AI试衣效果最好的软件。使用先进AIGC能力为电商卖家批量提供优质的、低成本的商拍图。合作品牌有Shein、Lazada、安踏、百丽等65个国内外头部品牌,以及国内10万+淘宝、天猫、京东等主流平台的品牌商家,为卖家节省将近85%的出图成本,提升约3倍出图效率,让品牌能够快速上架。

iTerms

iTerms

企业专属的AI法律顾问

iTerms是法大大集团旗下法律子品牌,基于最先进的大语言模型(LLM)、专业的法律知识库和强大的智能体架构,帮助企业扫清合规障碍,筑牢风控防线,成为您企业专属的AI法律顾问。

SimilarWeb流量提升

SimilarWeb流量提升

稳定高效的流量提升解决方案,助力品牌曝光

稳定高效的流量提升解决方案,助力品牌曝光

Sora2视频免费生成

Sora2视频免费生成

最新版Sora2模型免费使用,一键生成无水印视频

最新版Sora2模型免费使用,一键生成无水印视频

下拉加载更多