Ultimate Red Teaming Toolkit 2026

TEAM
🔴 Offensive Security & Red Team Operations Guide 2026

Ultimate Red Teaming Toolkit 2026 – Advanced Cybersecurity Operations Suite

Ultimate Red Teaming Toolkit 2026

The most comprehensive collection of open-source red teaming and adversary simulation tools in 2026 — covering reconnaissance, initial access, C2 frameworks, credential dumping, privilege escalation, defense evasion, lateral movement, exfiltration, and much more.

Professional Red Team Educational Resource
⚠️ Legal & Ethical Disclaimer: All tools and techniques listed in this guide are intended strictly for authorized penetration testing, adversary simulation, red team operations, cybersecurity research, and defensive threat hunting. Using these tools against systems you do not own or have explicit written permission to test is illegal and may result in serious criminal penalties. Always operate within the boundaries of the law and your engagement scope.

What is Red Teaming?

Red teaming is a structured adversary simulation exercise where a skilled offensive security team (the red team) simulates the full attack lifecycle of a real-world threat actor — including APT groups and Human-Operated Ransomware (HumOR) operators — against an organization's people, processes, and technology.

Unlike traditional penetration testing, red team operations are goal-based, stealth-focused, and designed to test an organization's detection and response capabilities. This toolkit aggregates the most effective open-source tools (OST) used by professional red teamers and threat hunters worldwide.

MITRE ATT&CK Adversary Simulation Threat Hunting EDR Bypass C2 Frameworks Post-Exploitation OSINT Credential Dumping

1. Reconnaissance

🔍

What is Reconnaissance?

Reconnaissance is the first phase of any red team engagement. The goal is to gather as much intelligence as possible about the target — infrastructure, employees, domains, cloud assets, exposed secrets, and attack surface — without triggering alerts.

  • Passive OSINT and active scanning
  • Domain & subdomain enumeration
  • Cloud asset discovery (AWS, Azure, GCP)
  • Email harvesting & LinkedIn recon
  • Secret scanning in public repos
  • Email spoofing configuration checks
Tool Description GitHub / URL
RustScanThe Modern Port Scanner — find open ports in seconds. Supports Python, Lua, and Shell scripting engine.github.com/RustScan/RustScan
AmassIn-depth Attack Surface Mapping and Asset Discovery by OWASP.github.com/OWASP/Amass
gitleaksSAST tool for detecting hardcoded secrets like passwords, API keys, and tokens in git repositories.github.com/zricethezav/gitleaks
S3ScannerScan for open S3 buckets and dump their contents.github.com/sa7mon/S3Scanner
cloud_enumMulti-cloud OSINT tool to enumerate public resources in AWS, Azure, and Google Cloud.github.com/initstring/cloud_enum
Recon-ngOpen Source Intelligence gathering framework aimed at reducing time spent harvesting from open sources.github.com/lanmaster53/recon-ng
busterAdvanced tool for email reconnaissance.github.com/sham00n/buster
linkedin2usernameOSINT tool to generate username lists for companies on LinkedIn.github.com/initstring/linkedin2username
WitnessMeWeb Inventory tool — takes screenshots of webpages using headless Chrome and provides enumeration extras.github.com/byt3bl33d3r/WitnessMe
pagodoPassive Google Dork — automate Google Hacking Database scraping and searching.github.com/opsdisk/pagodo
AttackSurfaceMapperAutomates the reconnaissance process for attack surface discovery.github.com/superhedgy/AttackSurfaceMapper
SpiderFootOpen source OSINT automation — integrates with virtually every data source available.github.com/smicallef/spiderfoot
dnscanPython wordlist-based DNS subdomain scanner.github.com/rbsec/dnscan
spoofcheckChecks if a domain can be spoofed by analyzing SPF and DMARC record configurations.github.com/BishopFox/spoofcheck
LinkedIntLinkedIn Recon Tool for gathering organizational intelligence.github.com/vysecurity/LinkedInt
BBOTRecursive internet scanner inspired by Spiderfoot — faster, more reliable, friendlier to pentesters.github.com/blacklanternsecurity/bbot
GatoGitHub Attack Toolkit — enumerate and exploit pipeline vulnerabilities in GitHub organizations.github.com/praetorian-inc/gato

2. Initial Access

🔑 Brute Force & Password Spraying

ToolDescriptionGitHub / URL
SprayingToolkitScripts to make password spraying attacks against Lync/S4B, OWA & O365 quicker and more efficient.github.com/byt3bl33d3r/SprayingToolkit
o365reconRetrieve information via O365 with a valid credential set.github.com/nyxgeek/o365recon
CredMasterRefactored CredKing password spraying tool using FireProx APIs to rotate IPs and stay anonymous.github.com/knavesec/CredMaster

💣 Payload Development

ToolDescriptionGitHub / URL
IvyPayload creation framework for executing arbitrary VBA (macro) source code directly in memory.github.com/optiv/Ivy
PEzorOpen-Source PE Packer for payload obfuscation.github.com/phra/PEzor
GadgetToJScriptGenerates .NET serialized gadgets that trigger .NET assembly execution from JS/VBS/VBA scripts.github.com/med0x2e/GadgetToJScript
ScareCrowPayload creation framework designed specifically around EDR bypass.github.com/optiv/ScareCrow
DonutPosition-independent shellcode for in-memory execution of VBScript, JScript, EXE, DLL, and .NET assemblies.github.com/TheWover/donut
MystikalmacOS Initial Access Payload Generator.github.com/D00MFist/Mystikal
charlotteC++ fully undetected shellcode launcher.github.com/9emin1/charlotte
InvisibilityCloakProof-of-concept obfuscation toolkit for C# post-exploitation tools.github.com/xforcered/InvisibilityCloak
EvilClippyCross-platform assistant for creating malicious MS Office documents — hides VBA macros and stomps P-Code.github.com/outflanknl/EvilClippy
ThreatCheckIdentifies the exact bytes that Microsoft Defender / AMSI flags on.github.com/rasta-mouse/ThreatCheck
SharpShooterPayload creation framework for CSharp source code retrieval and execution in HTA, JS, VBS, and WSF formats.github.com/mdsecactivebreach/SharpShooter
macro_packAutomates obfuscation and generation of MS Office documents and VB scripts for pentest assessments.github.com/sevagas/macro_pack
inceptorTemplate-Driven AV/EDR Evasion Framework.github.com/klezVirus/inceptor
FreezePayload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods.github.com/optiv/Freeze
ProtectMyToolingMulti-Packer wrapper for daisy-chaining packers, obfuscators, and red team weaponry with watermarking.github.com/mgeeky/ProtectMyTooling
DllShimmerWeaponize DLL hijacking easily — backdoor any function in any DLL.github.com/Print3M/DllShimmer

3. Delivery & Phishing

🎣

Phishing Frameworks

Modern phishing has evolved far beyond simple email spoofing. These tools enable real-time credential capture, session cookie theft, OAuth abuse, and adversary-in-the-middle attacks against MFA-protected accounts.

  • Reverse proxy phishing (MFA bypass)
  • OAuth consent grant abuse
  • O365 / Azure AD targeting
  • Browser exploitation via watering holes
ToolDescriptionGitHub / URL
Evilginx2Man-in-the-middle attack framework for phishing credentials and session cookies of any web service — bypasses MFA.github.com/kgretzky/evilginx2
GophishOpen-source phishing toolkit for businesses and pentesters — setup and execute phishing engagements easily.github.com/gophish/gophish
o365-attack-toolkitA toolkit to attack Office 365 environments.github.com/mdsecactivebreach/o365-attack-toolkit
PwnAuthWeb application framework for launching and managing OAuth abuse campaigns.github.com/fireeye/PwnAuth
ModlishkaFlexible and powerful reverse proxy for ethical phishing campaigns — next-level credential harvesting.github.com/drk1wi/Modlishka
BeEFThe Browser Exploitation Framework — penetration testing tool focused on the web browser and watering hole attacks.github.com/beefproject/beef

4. Command & Control (C2)

🖥️ Remote Access Tools & C2 Frameworks

🕹️

C2 Frameworks Overview

Command and Control frameworks are the backbone of any red team operation. They enable post-exploitation, tasking, lateral movement, and data exfiltration from compromised systems while maintaining stealth against blue team detection.

  • Encrypted beacon communications
  • Malleable C2 profiles for traffic shaping
  • Cross-platform agent support
  • Modular post-exploitation capabilities
  • EDR/AV evasion built-in
ToolDescriptionGitHub / URL
Cobalt StrikeIndustry-standard software for Adversary Simulations and Red Team Operations.cobaltstrike.com
SliverGeneral purpose cross-platform implant framework supporting C2 over mTLS, HTTP(S), and DNS.github.com/BishopFox/sliver
HavocModern and malleable post-exploitation C2 framework by @C5pider.github.com/HavocFramework/Havoc
MythicCross-platform post-exploit red teaming framework built with Python3, Docker, and a web browser UI.github.com/its-a-feature/Mythic
Brute Ratel C4Advanced Red Team & Adversary Simulation Software with strong EDR evasion capabilities.bruteratel.com
EmpirePost-exploitation framework with pure-PowerShell Windows agent and Python 3.x Linux/macOS agents.github.com/BC-SECURITY/Empire
PoshC2Proxy-aware C2 framework for red teaming, post-exploitation, and lateral movement.github.com/nettitude/PoshC2
Covenant.NET command and control framework highlighting the .NET attack surface with collaborative team features.github.com/cobbr/Covenant
MerlinCross-platform post-exploitation C2 server and agent written in Go.github.com/Ne0nd0g/merlin
PupyOpen-source cross-platform (Windows, Linux, macOS, Android) RAT and post-exploitation tool in Python.github.com/n1nj4sec/pupy
NimPlantLight first-stage C2 implant written in Nim and Python.github.com/chvancooten/NimPlant
SharpC2C2 framework written in C# with ASP.NET Core Team Server and .NET Framework implant.github.com/rasta-mouse/SharpC2
AdaptixC2Extensible post-exploitation and adversarial emulation framework — server written in Golang.github.com/Adaptix-Framework/AdaptixC2
NimhawkPowerful, modular, lightweight C2 framework written in Nim.github.com/hdbreaker/Nimhawk
SILENTTRINITYAsynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR.github.com/byt3bl33d3r/SILENTTRINITY
SpecterInsightCross-platform post-exploitation C2 framework based on .NET with ELK dashboards for operation analysis.practicalsecurityanalytics.com

🏗️ C2 Staging & Infrastructure

ToolDescriptionGitHub / URL
pwndropSelf-deployable file hosting for red teamers — upload and share payloads over HTTP and WebDAV.github.com/kgretzky/pwndrop
C2concealerCommand line tool that generates randomized C2 malleable profiles for Cobalt Strike.github.com/FortyNorthSecurity/C2concealer
Domain HunterChecks expired domains for categorization/reputation to find good C2 and phishing candidates.github.com/threatexpress/domainhunter
RedWardenFlexible CobaltStrike Malleable Redirector for traffic control.github.com/mgeeky/RedWarden
AzureC2RelayAzure Function that validates and relays Cobalt Strike beacon traffic via Malleable C2 profile verification.github.com/Flangvik/AzureC2Relay
C3Custom Command and Control — allows Red Teams to rapidly develop esoteric C2 channels.github.com/FSecureLABS/C3
RedGuardC2 front flow control tool — avoid Blue Teams, AVs, and EDR checks.github.com/wikiZ/RedGuard
GraphStrikeCobalt Strike HTTPS beaconing over the Microsoft Graph API.github.com/RedSiege/GraphStrike
SourcePointC2 profile generator for Cobalt Strike designed to ensure evasion.github.com/Tylous/SourcePoint
skyhookRound-trip obfuscated HTTP file transfer built to bypass IDS detections.github.com/blackhillsinfosec/skyhook

📊 Log Aggregation & Red Team SIEM

ToolDescriptionGitHub / URL
RedELKRed Team's SIEM — tracks Blue Team activities and provides better usability for long-term operations.github.com/outflanknl/RedELK
Elastic for Red TeamingResources for configuring a Red Team SIEM using Elastic.github.com/SecurityRiskAdvisors/RedTeamSIEM
RedEyeVisual analytic tool supporting both Red & Blue Team operations.github.com/cisagov/RedEye

5. Situational Awareness

🖥️ Host Situational Awareness

ToolDescriptionGitHub / URL
SeatbeltC# project performing security-oriented host-survey "safety checks" from both offensive and defensive perspectives.github.com/GhostPack/Seatbelt
SharpEDRCheckerChecks processes, DLLs, drivers, and services for known defensive products like AVs and EDRs.github.com/PwnDexter/SharpEDRChecker
Situational Awareness BOFBasic situational awareness commands implemented as Beacon Object Files for Cobalt Strike.github.com/trustedsec/CS-Situational-Awareness-BOF
SauronEyeSearch tool for finding files containing specific keywords — aids red teams in data discovery.github.com/vivami/SauronEye
SharpSharesMultithreaded C# .NET Assembly to enumerate accessible network shares in a domain.github.com/mitchmoser/SharpShares
AggressiveProxyEnumerates proxy configurations and communicates with C2 over HTTP(S) via discovered proxies.github.com/EncodeGroup/AggressiveProxy
GopherC# tool to discover low-hanging fruit during post-exploitation.github.com/EncodeGroup/Gopher

🌐 Domain Situational Awareness (Active Directory)

ToolDescriptionGitHub / URL
BloodHoundSix Degrees of Domain Admin — maps Active Directory attack paths using graph theory.github.com/BloodHoundAD/BloodHound
RubeusC# toolset for raw Kerberos interaction and abuses — Kerberoasting, AS-REP roasting, pass-the-ticket.github.com/GhostPack/Rubeus
ADReconGathers Active Directory information and generates a holistic report of the target AD environment.github.com/adrecon/ADRecon
StandInSmall AD post-compromise toolkit — Resource Based Constrained Delegation and more.github.com/FuzzySecurity/StandIn
SharpViewC# implementation of PowerView for AD enumeration without PowerShell.github.com/tevora-threat/SharpView
PSPKIAuditPowerShell toolkit for auditing Active Directory Certificate Services (AD CS) misconfigurations.github.com/GhostPack/PSPKIAudit
ADCSPwnEscalates privileges via Petitpotam coercion and certificate service relay attacks.github.com/bats3c/ADCSPwn
ImproHoundIdentifies attack paths in BloodHound that break AD tiering models.github.com/improsec/ImproHound
nanorobeusMinimalistic tool for managing Kerberos tickets — supports red team frameworks.github.com/wavvs/nanorobeus

6. Credential Dumping

ToolDescriptionGitHub / URL
MimikatzThe classic credential dumping tool — extracts Kerberos tickets, NTLM hashes, and plaintext passwords from Windows memory.github.com/gentilkiwi/mimikatz
nanodumpBeacon Object File that creates a minidump of the LSASS process stealthily.github.com/helpsystems/nanodump
DumpertLSASS memory dumper using direct system calls and API unhooking.github.com/outflanknl/Dumpert
PPLBladeProtected Process Dumper with memory dump obfuscation and remote transfer capabilities.github.com/tastypepperoni/PPLBlade
PPLKillerTool to bypass LSA Protection (Protected Process Light).github.com/RedCursorSecurityConsulting/PPLKiller
LaZagneOpen source application to retrieve passwords stored locally on a computer from dozens of sources.github.com/AlessandroZ/LaZagne
SharpDPAPIC# port of Mimikatz DPAPI functionality for credential decryption.github.com/GhostPack/SharpDPAPI
KeeThiefExtracts KeePass 2.X key material from memory and enables backdooring of the trigger system.github.com/GhostPack/KeeThief
SharpChromium.NET project to retrieve Chromium cookies, history, and saved logins.github.com/djhohnstein/SharpChromium
pypykatzMimikatz implementation in pure Python for cross-platform credential extraction.github.com/skelsec/pypykatz
SafetyKatzCombination of Mimikatz and a .NET PE Loader for safer in-memory execution.github.com/GhostPack/SafetyKatz
CredBanditBOF using static x64 syscalls for complete in-memory process dump via Beacon communication channel.github.com/xforcered/CredBandit
TrickDumpDumps LSASS using only NTAPIs — generates JSON files and creates Minidump offline.github.com/ricardojoserf/TrickDump
RemoteMonologueWindows credential harvesting via Interactive User RunAs key and NTLM coercion through DCOM.github.com/3lp4tr0n/RemoteMonologue
SharpLAPSRetrieve LAPS password from LDAP — useful in environments with local admin password solution deployed.github.com/swisskyrepo/SharpLAPS
Net-GPPPassword.NET implementation of Get-GPPPassword — retrieves plaintext passwords from Group Policy Preferences.github.com/outflanknl/Net-GPPPassword

7. Privilege Escalation

ToolDescriptionGitHub / URL
GodPotatoSYSTEM escalation via ImpersonatePrivilege — "As Long as You Have ImpersonatePrivilege, You Are SYSTEM!"github.com/BeichenDream/GodPotato
SweetPotatoCollection of native Windows privilege escalation techniques from service accounts to SYSTEM.github.com/CCob/SweetPotato
MultiPotatoAnother Potato to get SYSTEM via SeImpersonate privileges — multiple techniques.github.com/S3cur3Th1sSh1t/MultiPotato
KrbRelayUpUniversal no-fix local privilege escalation in Windows domain environments without LDAP signing.github.com/Dec0ne/KrbRelayUp
PEASSPrivilege Escalation Awesome Scripts SUITE — WinPEAS and LinPEAS for Windows and Linux.github.com/carlospolop/PEASS-ng
Watson.NET tool to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities.github.com/rasta-mouse/Watson
SharpUpC# port of PowerUp functionality — checks for common privilege escalation misconfigurations.github.com/GhostPack/SharpUp
dazzleUPDetects privilege escalation vulnerabilities caused by misconfigurations and missing Windows updates.github.com/hlldz/dazzleUP
ElevateKitDemonstrates third-party privilege escalation attacks with Cobalt Strike's Beacon payload.github.com/rsmudge/ElevateKit
PrivKitBeacon Object File that detects privilege escalation vulnerabilities caused by Windows misconfigurations.github.com/mertdas/PrivKit

8. Defense Evasion

👻

EDR / AV Bypass Techniques

Defense Evasion is one of the most critical phases of a red team engagement. Modern EDRs use userland hooks, kernel callbacks, and ETW telemetry to detect malicious activity. These tools help operators bypass each layer.

  • Userland hook bypassing (unhooking NTDLL)
  • Kernel callback removal via BYOVD
  • ETW telemetry blocking
  • Event log manipulation
  • Process injection alternatives
  • Memory scanner evasion
ToolDescriptionGitHub / URL
EDRSandBlastWeaponizes a vulnerable signed driver to bypass EDR kernel callbacks and ETW TI provider.github.com/wavestone-cdt/EDRSandblast
EDRSilencerUses Windows Filtering Platform (WFP) to block EDR agents from reporting events to their server.github.com/netero1010/EDRSilencer
BackstabTool to kill antimalware-protected processes.github.com/Yaxser/Backstab
BlackoutKill anti-malware protected processes using BYOVD (Bring Your Own Vulnerable Driver).github.com/ZeroMemoryEx/Blackout
RefleXXionUtility designed to aid in bypassing user-mode hooks used by AV/EPP/EDR products.github.com/hlldz/RefleXXion
SharpUnhookerC# Universal API Unhooker — automatically unhooks ntdll, kernel32, user32, advapi32, kernelbase.github.com/GetRektBoy724/SharpUnhooker
EvtMuteApply filters to events reported by Windows Event Logging — suppress detection telemetry.github.com/bats3c/EvtMute
Phant0mWindows Event Log Killer — terminates Event Log service threads.github.com/hlldz/Phant0m
BlockETW.NET 3.5/4.5 Assembly to block ETW telemetry in a process.github.com/Soledge/BlockEtw
NetLoaderLoads any C# binary from filepath or URL while patching AMSI and bypassing Windows Defender at runtime.github.com/Flangvik/NetLoader
MangleManipulates compiled executables (.exe or DLL) to avoid EDR detection.github.com/optiv/Mangle
SigFlipPatches authenticode-signed PE files without invalidating the existing signature.github.com/med0x2e/SigFlip
ShellGhostMemory-based evasion technique making shellcode invisible from process start to end.github.com/lem0nSec/ShellGhost
AceLdrCobalt Strike UDRL (User-Defined Reflective Loader) for memory scanner evasion.github.com/kyleavery/AceLdr
PoolPartyBofBOF implementation of PoolParty Process Injection via Windows Thread Pools.github.com/0xEr3bus/PoolPartyBof
InlineExecute-AssemblyBOF for in-process .NET assembly execution as an alternative to fork-and-run.github.com/xforcered/InlineExecute-Assembly
EDR-FreezePuts EDR and AntiMalware processes into a coma/suspended state.github.com/TwoSevenOneT/EDR-Freeze
DarkLoadLibraryLoadLibrary replacement for offensive operations — evades detection.github.com/bats3c/DarkLoadLibrary

9. Persistence

ToolDescriptionGitHub / URL
SharPersistWindows persistence toolkit written in C# — registry, scheduled tasks, services, and more.github.com/fireeye/SharPersist
SharpStay.NET project for installing a wide variety of persistence mechanisms.github.com/0xthirteen/SharpStay
SharpHideTool to create hidden registry keys that are invisible to standard registry viewers.github.com/outflanknl/SharpHide
DAMPPersistence through host-based Security Descriptor Modification — Discretionary ACL manipulation.github.com/HarmJ0y/DAMP
IIS-RaidNative backdoor module for Microsoft IIS (Internet Information Services).github.com/0x09AL/IIS-Raid
ScheduleRunnerC# tool for customizing scheduled tasks for both persistence and lateral movement in red team ops.github.com/netero1010/ScheduleRunner
SharpEventPersistPersistence by writing and reading shellcode from Windows Event Log.github.com/improsec/SharpEventPersist
SharPyShellTiny and obfuscated ASP.NET webshell for C# web applications.github.com/antonioCoco/SharPyShell
KrakenModular multi-language webshell framework.github.com/kraken-ng/Kraken
HiddenDesktopHVNC (Hidden Virtual Network Computing) for Cobalt Strike.github.com/WKL-Sec/HiddenDesktop
reGeorgSuccessor to reDuh — creates SOCKS proxies through the DMZ via compromised web servers.github.com/sensepost/reGeorg

10. Lateral Movement

ToolDescriptionGitHub / URL
CrackMapExecA swiss army knife for pentesting networks — SMB, WinRM, LDAP, MSSQL enumeration and exploitation.github.com/byt3bl33d3r/CrackMapExec
impacketPython classes for working with network protocols — SMB, MSRPC, Kerberos, LDAP attack library.github.com/SecureAuthCorp/impacket
Responder / MultiRelayLLMNR/NBT-NS/mDNS Poisoner and NTLMv1/2 Relay — capture and relay Net-NTLMv2 hashes.github.com/lgandx/Responder
kerbruteQuickly bruteforce and enumerate valid Active Directory accounts via Kerberos Pre-Authentication.github.com/ropnop/kerbrute
SharpRDPRDP Console Application for Authenticated Command Execution without spawning visible sessions.github.com/0xthirteen/SharpRDP
SCShellFileless lateral movement tool that relies on ChangeServiceConfigA to run commands remotely.github.com/Mr-Un1k0d3r/SCShell
PowerUpSQLPowerShell Toolkit for Attacking Microsoft SQL Server in AD environments.github.com/NetSPI/PowerUpSQL
SQLReconC# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.github.com/skahwah/SQLRecon
CoercerPython script to automatically coerce a Windows server to authenticate via 9 different methods.github.com/p0dalirius/Coercer
SharpGPOAbuseExploits user edit rights on Group Policy Objects (GPO) to compromise managed AD objects.github.com/FSecureLABS/SharpGPOAbuse
MoveKitExtension of Cobalt Strike lateral movement using SharpMove and SharpRDP .NET assemblies.github.com/0xthirteen/MoveKit
Invoke-TheHashPowerShell Pass-The-Hash utilities for lateral movement without cracking NTLM hashes.github.com/Kevin-Robertson/Invoke-TheHash
LiquidSnakeFileless lateral movement using WMI Event Subscriptions and GadgetToJScript.github.com/RiccardoAncarani/LiquidSnake
orpheusBypasses Kerberoast detections using modified KDC options and encryption types.github.com/trustedsec/orpheus
goexecNew take on remote execution methods for Windows — largely unrealized with significant OPSEC improvements.github.com/FalconOpsLLC/goexec
BitlockMoveLateral Movement via Bitlocker DCOM interfaces and COM Hijacking.github.com/rtecCyberSec/BitlockMove
MalSCCMAbuse local or remote SCCM servers to deploy malicious applications to managed hosts.github.com/nettitude/MalSCCM
SharpNoPSExecFile-less command execution for lateral movement without dropping PsExec.github.com/juliourena/SharpNoPSExec

🔗 Tunneling

ToolDescriptionGitHub / URL
ChiselFast TCP/UDP tunnel over HTTP secured via SSH — single executable for client and server.github.com/jpillora/chisel
ligolo-ngAdvanced tunneling tool using a TUN interface — simple and reliable for complex pivot networks.github.com/nicocha30/ligolo-ng
frpFast reverse proxy to expose local servers behind NAT or firewall to the internet.github.com/fatedier/frp
SockTailJoins a device to a Tailscale network and exposes a local SOCKS5 proxy — stealthy red team pivoting.github.com/Yeeb1/SockTail

11. Exfiltration

ToolDescriptionGitHub / URL
SharpExfiltrateModular C# framework to exfiltrate data over secure and trusted channels.github.com/Flangvik/SharpExfiltrate
DNSExfiltratorData exfiltration over DNS request covert channel — bypasses most network controls.github.com/Arno0x/DNSExfiltrator
Egress-AssessTool used to test egress data detection capabilities of security controls.github.com/FortyNorthSecurity/Egress-Assess
VeilTransferData exfiltration utility simulating real-world techniques used by advanced threat actors.github.com/infosecn1nja/VeilTransfer

12. Cloud Security (AWS & Azure)

☁️

Amazon Web Services (AWS)

  • pacu — The AWS exploitation framework for testing Amazon Web Services environments. GitHub
  • CloudMapper — Analyze and visualize your AWS environments. GitHub
  • Enumerate IAM permissions — Enumerate permissions associated with an AWS credential set. GitHub
🔷

Microsoft Azure

  • ROADtools — The Azure AD exploration framework. GitHub
  • AADInternals — PowerShell module for administering Azure AD and Office 365. GitHub
  • TeamFiltration — Cross-platform framework for enumerating, spraying, and exfiltrating O365 AAD accounts. GitHub
  • MicroBurst — PowerShell toolkit for assessing Microsoft Azure security. GitHub
  • MAAD Attack Framework — Simple, fast & effective security testing of M365 & Azure AD. GitHub
  • GraphRunner — Post-exploitation toolset for interacting with the Microsoft Graph API. GitHub
  • Maestro — Post-exploitation tool for Intune/EntraID interaction from a C2 agent. GitHub
  • TokenTactics — Azure JWT Token Manipulation Toolset. GitHub
  • ADOKit — Attacks Azure DevOps Services via the available REST API. GitHub

13. Adversary Emulation

ToolDescriptionGitHub / URL
Atomic Red TeamSmall and highly portable detection tests mapped to the MITRE ATT&CK Framework.github.com/redcanaryco/atomic-red-team
CalderaAutomated adversary emulation system performing post-compromise adversarial behavior in Windows environments.github.com/mitre/caldera
Stratus Red Team"Atomic Red Team for the cloud" — granular and self-contained cloud attack emulation.github.com/DataDog/stratus-red-team
APTSimulatorWindows Batch script using tools and output files to make a system appear compromised by an APT.github.com/NextronSystems/APTSimulator
Network Flight SimulatorGenerates malicious network traffic to help security teams evaluate controls and network visibility.github.com/alphasoc/flightsim
MettaSecurity preparedness tool for adversarial simulation exercises.github.com/uber-common/metta
Red Team Automation (RTA)Framework of scripts allowing blue teams to test detection capabilities against MITRE ATT&CK tradecraft.github.com/endgameinc/RTA
TTPForgeFramework for development, automation, and execution of Tactics, Techniques, and Procedures (TTPs).github.com/facebookincubator/TTPForge
Prelude OperatorDeveloper-first advanced security platform for mimicking real adversarial attacks.preludesecurity.com

14. AI Red Teaming & Offensive AI Agents

🤖

AI Red Teaming Tools

The emergence of LLMs in production environments has created an entirely new attack surface. These tools help security teams evaluate, test, and red-team AI systems for jailbreaks, prompt injection, and unsafe behaviors.

ToolDescriptionURL
promptfooCLI and framework for evaluating, testing, and red-teaming LLM applications and prompts.GitHub
GarakLLM vulnerability scanner — probes for weaknesses, jailbreaks, and unsafe model behaviors.GitHub
PyRITMicrosoft's Python Risk Identification Tool for identifying risks in generative AI systems.GitHub
FuzzyAIPowerful automated LLM fuzzer for identifying jailbreaks and security vulnerabilities in LLM APIs.GitHub
deepevalSimple open-source LLM evaluation framework for large-language model system assessments.GitHub

Offensive AI Agents

Next-generation autonomous AI agent frameworks for automated penetration testing, from reconnaissance all the way through post-exploitation — with zero or minimal human intervention.

ToolDescriptionURL
PentAGIFully autonomous AI Agents system capable of performing complex penetration testing tasks.GitHub
HexStrike AIAdvanced MCP server letting AI agents autonomously run 150+ cybersecurity tools.GitHub
CAILightweight open-source framework for building AI-powered offensive and defensive automation.GitHub
RedAmonAI-powered agentic red team framework automating full offensive operations with zero human intervention.GitHub
raptorTurns Claude Code into a general-purpose AI offensive/defensive security agent.GitHub

15. Living Off The Land (LOL)

🌾

LOL Resources

Living Off the Land techniques use legitimate, trusted system binaries and tools to evade detection. These curated reference databases help both red teamers identify abuse opportunities and defenders understand the risks.

  • LOLBAS — Every binary, script, and library for LOL techniques on Windows. lolbas-project.github.io
  • GTFOBins — Unix binaries for bypassing local security restrictions. gtfobins.github.io
  • LOOBins — macOS binaries abusable by threat actors. loobins.io
  • Living Off The Land Drivers — Windows drivers used by adversaries to bypass security controls. loldrivers.io
  • Living Off Trusted Sites (LOTS) — Legitimate domains abused for phishing, C2, and exfiltration. lots-project.com
  • Filesec — Latest file extensions being used by attackers. filesec.io
  • Hijack Libs — Curated list of DLL Hijacking candidates. hijacklibs.net
  • WTFBins — Benign applications that exhibit suspicious/malware-like behavior. wtfbins.wtf

16. Miscellaneous — Reporting, Intelligence & Infrastructure

📝

Reporting & Tracking

  • Ghostwriter — Django-based web app for red team operators — reporting and operation tracking. GitHub
  • VECTR — Tracks red and blue team testing activities to measure detection across attack scenarios. GitHub
  • PurpleOps — Open-source self-hosted purple team management web application. GitHub
  • Nemesis — Offensive data enrichment pipeline and operator support system. GitHub
🧠

Threat Intelligence

  • APT REPORT — Interesting APT report collection and IOC repository. GitHub
  • Awesome Threat Intelligence — Curated list of threat intelligence resources. GitHub
  • deepdarkCTI — CTI sources from the deep and dark web. GitHub
  • CTI Dashboard — Real-time cybersecurity threat intelligence from multiple vendors in one place. start.me
  • Hudson Rock — Free cybercrime intelligence toolset — check if emails/domains were compromised in Infostealer attacks. hudsonrock.com
  • Tidal Cyber — Helps organizations define, measure, and improve defenses against prioritized adversary behaviors. tidalcyber.com

Red Team Tool Category Overview

Category Tool Count Key Tools Primary Use Skill Level
Reconnaissance 17+ Amass, BBOT, SpiderFoot Target profiling & OSINT Beginner–Medium
Command & Control 20+ Sliver, Havoc, Cobalt Strike Post-exploitation & tasking Advanced
Credential Dumping 18+ Mimikatz, nanodump, LaZagne Credential harvesting Medium–Advanced
Defense Evasion 20+ EDRSandBlast, Mangle, SigFlip AV/EDR bypass Advanced
Lateral Movement 22+ CrackMapExec, impacket, Coercer Network traversal Medium–Advanced
Privilege Escalation 10+ GodPotato, PEASS, Watson Gaining higher privileges Medium
Cloud (AWS/Azure) 14+ pacu, ROADtools, MAAD-AF Cloud environment testing Advanced
AI Red Teaming 10+ promptfoo, Garak, PyRIT LLM security evaluation Medium
We Use Cookies

#buttons=(Ok, Go it!) #days=(20)

We use cookies to enhance your browsing experience, analyze site performance, and deliver personalized content. By continuing to use this site, you consent to our use of cookies. Learn more