Red Teaming Toolkit
Red Teaming Toolkit
This repository contains cutting-edge open-source security tools (OST) that will help you during
adversary simulation and as information intended for threat hunter can make detection and
prevention control easier. The list of tools below that could be potentially misused by threat
actors such as APT and Human-Operated Ransomware (HumOR). If you want to contribute to
this list send me a pull request.
Table of Contents
Reconnaissance
Initial Access
Delivery
Situational Awareness
Credential Dumping
Privilege Escalation
Defense Evasion
Persistence
Lateral Movement
Exfiltration
Miscellaneous
Reconnaissance
AttackSurfaceMapper is a tool
AttackSurfaceMapper that aims to automate the https://tinyurl.com/yxmn4wbt
reconnaissance process.
Initial Access
Brute Force
Payload Development
Delivery
Phishing
o365-
attack- A toolkit to attack Office365 https://tinyurl.com/25xqt4bf
toolkit
Empire 5 is a post-exploitation
framework that includes a pure-
Empire PowerShell Windows agent, and https://tinyurl.com/yckfweyv
compatibility with Python 3.x Linux/OS
X agents.
Staging
Name Description URL
AzureC2Relay is an Azure
Function that validates and relays
Cobalt Strike beacon traffic by
AzureC2Relay https://tinyurl.com/2ywnzfp8
verifying the incoming requests
based on a Cobalt Strike
Malleable C2 profile.
Cobalt Strike
Cobalt Strike Malleable C2
Malleable C2 Design https://tinyurl.com/27u6je3b
Design and Reference Guide
and Reference Guide
Quick and dirty dynamic
redirect.rules https://tinyurl.com/26dfhoc3
redirect.rules generator
Servicebus
SourcePoint is a C2 profile
generator for Cobalt Strike
SourcePoint https://tinyurl.com/22ye4t26
command and control servers
designed to ensure evasion.
Log Aggregation
Elastic
Repository of resources for configuring a Red
for Red https://tinyurl.com/26c4v6fx
Team SIEM using Elastic.
Teaming
Situational Awareness
C# implementation of harmj0y's
SharpView https://tinyurl.com/26vlxhql
PowerView
Credential Dumping
Privilege Escalation
Defense Evasion
Persistence
Persistence by writing/reading
SharpEventPersist https://tinyurl.com/28hnstvz
shellcode from Event Log
Lateral Movement
A C# implementation of a computer
object takeover through Resource-
Based Constrained Delegation (msDS-
SharpAllowedToAct https://tinyurl.com/29yb2ccb
AllowedToActOnBehalfOfOtherIdentity)
based on the research by
@elad_shamir.
Sharp RDP Hijack is a proof-of-
concept .NET/C# Remote Desktop
SharpRDPHijack https://tinyurl.com/2cpqddyw
Protocol (RDP) session hijack utility for
disconnected sessions
Miscellaneous
Threat-informed Defense
Cloud
Enumerate
Enumerate the permissions associated https://tinyurl.com/yy86zgea
IAM
with AWS credential set
permissions
Azure
MicroBurst: A
PowerShell A collection of scripts for assessing
https://tinyurl.com/27zfacq2
Toolkit for Microsoft Azure security
Attacking Azure
TeamFiltration is a cross-platform
framework for enumerating, spraying,
TeamFiltration https://tinyurl.com/26pabg6g
exfiltrating, and backdooring O365
AAD accounts.
Adversary Emulation
Name Description URL
License
To the extent possible under law, Rahmat Nurfauzi "@infosecn1nja" has waived all copyright and
related or neighboring rights to this work.