Tools and Techniques for Red Team / Penetration Testing
-
Updated
Mar 18, 2025
Tools and Techniques for Red Team / Penetration Testing
🐢 Open-Source Evaluation & Testing library for LLM Agents
Adversary simulation and Red teaming platform with AI
The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and engineers to proactively identify risks in generative AI systems.
Sandman is a NTP based backdoor for hardened networks.
Nimbo-C2 is yet another (simple and lightweight) C2 framework
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Venom is a library that meant to perform evasive communication using stolen browser socket
Compiled tools for internal assessments
Extract SAM and SYSTEM using Volume Shadow Copy (VSS) API. With multiple exfiltration options and XOR obfuscation
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
Generic PE loader for fast prototyping evasion techniques
Repo containing cracked red teaming tools.
Framework for testing vulnerabilities of large language models (LLM).
A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.
Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares
Spoofing desktop login applications with WinForms and WPF
Self-hosted passive subdomain continous monitoring tool.
Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations
Add a description, image, and links to the red-team-tools topic page so that developers can more easily learn about it.
To associate your repository with the red-team-tools topic, visit your repo's landing page and select "manage topics."