Red Team Security Tools

Browse Cybersecurity Tools in this category

17 InfoSec Tools

atomic-red-team

atomic-red-team

by redcanaryco

Small and highly portable detection tests based on MITRE's ATT&CK.

mitre mitre-attack
Jun 01, 2025
evilginx2

evilginx2

by kgretzky

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

security tool
Jun 01, 2025
shad0w

shad0w

by bats3c

A post exploitation framework designed to operate covertly on heavily monitored environments

c c2 docker
Jun 01, 2025
Lodestar-Forge

Lodestar-Forge

by c0nf1den71al

Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.

security
Jun 01, 2025
smbcrawler

smbcrawler

by SySS-Research

smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares

pentest red-team-tools shares
May 31, 2025
Havoc

Havoc

by HavocFramework

The Havoc Framework

security tool
May 31, 2025
sliver

sliver

by BishopFox

Adversary Emulation Framework

adversarial-attacks adversary-simulation c2
May 31, 2025
DojoLoader

DojoLoader

by naksyn

Generic PE loader for fast prototyping evasion techniques

cobalt-strike edr-evasion evasion
May 31, 2025
Nimbo-C2

Nimbo-C2

by itaymigdal

Nimbo-C2 is yet another (simple and lightweight) C2 framework

c2 c2-framework command-and-control
May 31, 2025
Sandman

Sandman

by Idov31

Sandman is a NTP based backdoor for red team engagements in hardened networks.

backdoor csharp cybersecurity
May 31, 2025
dnstwist

dnstwist

by hazcod

A tool to monitor for potential spear phishing domains and send to Slack.

detection dnstwist phishing
May 31, 2025
shell_bringer

shell_bringer

by onurcangnc

ShellBringer is a Python script designed for penetration testers. It facilitates the creation and management of reverse shell payloads, automating listener setup across multiple platforms.

security tool
May 31, 2025
evil-winrm-py

evil-winrm-py

by adityatelange

Execute commands interactively on remote Windows machines using the WinRM protocol

cli evil-winrm-py pentesting
May 31, 2025
ImpulsiveDLLHijack

ImpulsiveDLLHijack

by knight0x07

C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.

cybersecurity dll-hijacking redteam
May 30, 2025
linux-smart-enumeration

linux-smart-enumeration

by diego-treitos

Linux enumeration tool for pentesting and CTFs with verbosity levels

ctfs hacking hackthebox
May 30, 2025
Crassus

Crassus

by vu-ls

An MCP server implementation

security tool
May 30, 2025
ligolo-ng

ligolo-ng

by nicocha30

An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.

golang offensive-security pentest-tool
May 30, 2025