Welcome to the Red Team Toolkit repository! This collection of tools is designed for various Red Team activities, ranging from phishing to credential sniffing. Please use these tools responsibly and in compliance with applicable laws and regulations.
This repository aims to provide a comprehensive set of tools for Red Teamers, enabling them to simulate real-world cyber threats and test the security defenses of systems and networks.
The following table maps the tools in this repository to MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework techniques.
Tool Name | MITRE Tactics |
---|---|
Modlishka | Phishing |
Redsnarf | Exfiltration |
ADRecon | Reconnaissance |
ADACLScanner | Reconnaissance |
Note: This table provides a brief overview. Detailed documentation for each tool can be found in their respective directories.
We welcome contributions to this Red Team Toolkit! If you have additional tools or improvements to existing ones, please feel free to submit a pull request.
Usage of the tools in this repository for unauthorized access or any malicious activity is strictly prohibited. The repository owner and contributors are not responsible for any misuse or legal consequences arising from the use of these tools.
Note: Please ensure that you provide thorough documentation for each tool in your repository, including installation instructions, usage guidelines, and any dependencies. Additionally, always emphasize responsible and ethical use of these tools.