BloodHound: Analyzing Active Directory for Security Risks and Attack Paths

BloodHound is a powerful tool for analyzing Active Directory environments, helping red teamers and pen testers visualize complex relationships, identify security risks and attack paths, and develop effective mitigation strategies to strengthen an organization’s security posture.

Mythic: An Introduction to the Open Source Post-Exploitation Framework

Mythic is a powerful, open-source post-exploitation framework that offers red teamers and pen testers an extensible and customizable platform with numerous modules, agents, and C2 profiles to enhance their engagements and achieve objectives in various target environments.

SharpSocks: A .NET-Based Proxy for Red Teaming and Network Penetration Testing

SharpSocks is a powerful .NET-based proxy tool for red teaming and network penetration testing that enables encrypted communications, protocol obfuscation, and access to internal resources, providing professional hackers with stealth and persistence in their engagements.

Covenant: Command and Control for Red Teaming and Post-Exploitation Operations

This article provides a comprehensive guide to using Covenant, a powerful command and control framework for red teaming and post-exploitation operations, covering its architecture, installation, setup, usage, real-world examples, and custom task development for a technical audience.

Nishang: PowerShell Scripts for Penetration Testing and Red Teaming

This article explores Nishang, a collection of PowerShell scripts designed for penetration testing and red teaming, covering its various modules, usage examples, and real-world applications, ultimately demonstrating the tool’s value and versatility for cybersecurity professionals.

Empire: A Comprehensive Red Teaming Framework Built on PowerShell

Empire is a comprehensive PowerShell-based red teaming framework that offers a wide array of modules and capabilities for exploiting and controlling compromised systems, enabling pen testers and red teamers to level up their skills and identify security vulnerabilities effectively.

PowerSploit: Using PowerShell for Offensive Security Operations

PowerSploit, a collection of PowerShell modules designed for offensive security operations, offers powerful tools for code execution, script modification, persistence, privilege escalation, recon, and exfiltration, enabling penetration testers and red teamers to enhance their skills and stay ahead in the cybersecurity landscape.

Metasploit Framework: An Overview of the Open Source Penetration Testing Tool

This comprehensive guide provides an in-depth overview of the Metasploit Framework, covering its history, components, modules, and real-world examples, empowering penetration testers and red teamers to effectively exploit vulnerabilities and enhance their skills using this powerful open-source tool.

Cobalt Strike Community Edition: Getting Started with the Open Source Red Teaming Tool

This comprehensive guide explores the open-source red teaming tool Cobalt Strike Community Edition, covering environment setup, reconnaissance, exploitation, post-exploitation, reporting, and cleanup while providing real-world examples and code samples for a technical audience.

Chisel - Tunneling Traffic with SSH over HTTP

Comprehensive guide to Chisel: traffic tunneling via SSH over HTTP, with installation, use cases, and advanced tips for overcoming network restrictions.