RedTeam.Blue

Showing 1-28 of 502 tool(s)
Page 1 of 18
ZAP Proxy
Web Application Security

ZAP Proxy

Open-source scanner to find web app vulnerabilities, useful for developers and pentesters.

Frida
Mobile Security

Frida

Dynamic instrumentation toolkit for reverse engineering and security testing.

HTTP Toolkit
Web Application Security

HTTP Toolkit

Open-source tool to intercept, inspect, and modify HTTP(S) traffic for testing and debugging.

Hetty
Web Application Security

Hetty

HTTP toolkit for security testing, open source alternative to Burp Suite Pro.

Container Penetration Toolkit
Container Security

Container Penetration Toolkit

Toolkit for container exploitation and escaping to compromise Kubernetes clusters.

WPCracker
Password Attacks

WPCracker

Enumerates users and brute forces WordPress logins with adjustable attack aggressiveness.

MetaFinder
Reconnaissance and OSINT

MetaFinder

Searches domain documents via search engines to extract relevant metadata.

RunasCs
Privilege Escalation

RunasCs

Runs processes with alternate credentials in Windows, improving on runas.exe limitations.

Kerbrute
Password Attacks

Kerbrute

Bruteforce and enumerate AD accounts via flaws in Kerberos Pre-Authentication.

LaZagne
Post-Exploitation

LaZagne

Extracts locally stored passwords from popular software on the compromised system.

Rubeus
Post-Exploitation

Rubeus

C# toolset for Kerberos interaction and abuse in Windows environments.

SecLists
Red Team Operations

SecLists

Collection of useful lists for security testing: passwords, usernames, fuzzing, payloads, etc.

Reverse Shell Generator
Post-Exploitation

Reverse Shell Generator

Generates reverse shell commands in various languages for easy C2 connections.

commix
Exploitation Frameworks

commix

Tool for automatic detection and exploitation of command injection vulnerabilities.

Nishang
Post-Exploitation

Nishang

Nishang is a PowerShell toolkit for post-exploitation and offensive security testing.

Havoc
Command and Control (C2)

Havoc

Havoc is a modern and customizable post-exploitation and C2 framework.

BeEF
Web Application Security

BeEF

BeEF exploits web browsers for client-side attacks and security assessments.

Responder
Network Penetration

Responder

Responder is a LLMNR, NBT-NS, and mDNS poisoner used to capture credentials and perform SMB attacks in local networks.

PRISMX
Cloud Security

PRISMX

Cloud security dashboard based on AWS CIS Benchmarks. Provides executive overview and actionable insights for technical contributors.

Scout Suite
Cloud Security

Scout Suite

Scout Suite assesses security posture in multi-cloud environments by collecting configuration data via cloud provider APIs and highlighting risks.

AAweRT
Reconnaissance and OSINT

AAweRT

Recon framework automating phases of info gathering and vulnerability assessment, with organized session folders for each run.

ZEROPATH
DevSecOps Tools

ZEROPATH

AI scans code to detect broken auth, logic flaws, outdated dependencies, and more for developers.

HackTheLan
Red Team Operations

HackTheLan

Automated offensive toolkit for LAN/WLAN attacks and on-site network reconnaissance.

RAWPA
Red Team Operations

RAWPA

Interactive assistant with methodology and workflows for pentesting and security research.

CAI
AI Security

CAI

Lightweight framework to build cybersecurity AIs (CAIs), optimized for bug bounty hunting and vulnerability analysis.

ZERO Threat
Web Application Security

ZERO Threat

AI-powered continuous pentest platform detecting 40,000+ vulnerabilities in real time.

WuppieFuzz
Web Application Security

WuppieFuzz

WuppieFuzz is a coverage-guided REST API fuzzer focused on usability, flaw explainability, and modularity.

Wapiti
Web Application Security

Wapiti

Wapiti performs black-box scans on web apps, injecting payloads to identify vulnerabilities.

Avatar do ChatGPT