All Projects → sectool → Redteam Hardware Toolkit

sectool / Redteam Hardware Toolkit

Licence: mit
🔺 Red Team Hardware Toolkit 🔺

Programming Languages

hack
652 projects

Projects that are alternatives of or similar to Redteam Hardware Toolkit

Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+5409.82%)
Mutual labels:  hacking, hacking-tool, redteam, bugbounty
Awesome Hacking Lists
平常看到好的渗透hacking工具和多领域效率工具的集合
Stars: ✭ 311 (+90.8%)
Mutual labels:  hacking, hacking-tool, hacker, bugbounty
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+370.55%)
Mutual labels:  hacking, hacking-tool, bugbounty
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+6311.66%)
Mutual labels:  hacking, hacker, hackers
Awesome Mobile Security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+1026.99%)
Mutual labels:  hacking, redteam, bugbounty
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+1082.82%)
Mutual labels:  hacking, hacking-tool, bugbounty
Redteamtools
记录自己编写、修改的部分工具
Stars: ✭ 752 (+361.35%)
Mutual labels:  hacking, hacking-tool, redteam
Blackworm
Black Worm Offical Repo
Stars: ✭ 80 (-50.92%)
Mutual labels:  hacking, hacker, hackers
Grecon
Your Google Recon is Now Automated
Stars: ✭ 119 (-26.99%)
Mutual labels:  hacking, hacking-tool, bugbounty
Gofingerprint
GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fingerprints.
Stars: ✭ 120 (-26.38%)
Mutual labels:  hacking, hacking-tool, bugbounty
Oxidtools
200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (-12.27%)
Mutual labels:  hacking, hacking-tool, hacker
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+344.79%)
Mutual labels:  hacking, hacking-tool, redteam
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+315.34%)
Mutual labels:  hacking, hacking-tool, redteam
Interlace
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+366.26%)
Mutual labels:  hacking, hacking-tool, bugbounty
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+4345.4%)
Mutual labels:  hacking, hacking-tool, bugbounty
Payloadsallthethings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+20089.57%)
Mutual labels:  hacking, redteam, bugbounty
Entropy
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-22.7%)
Mutual labels:  hacking, hacking-tool, hacker
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+153.37%)
Mutual labels:  hacking, hacking-tool, hacker
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+161.96%)
Mutual labels:  hacking, hacking-tool, bugbounty
Collection Document
Collection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+750.92%)
Mutual labels:  hacking, redteam, hacker

Red Team Hardware Toolkit


A collection of hardware s that aid in red team operations. This repository will help you during red team engagement. If you want to contribute to this list send me a pull request.


Main


A Red Team should be formed with the intention of identifying and assessing vulnerabilities, testing assumptions, viewing alternate options for attack and revealing the limitations and security risks for that organization.

There are many benefits to Red Teaming. First, you have a designated group with tactical experience in challenging the security of your organization at all times. This is important to see how your organization will fair against the very same tactics adversaries will hope to deploy on your environment. An effective Red Team:

  • Challenges your organization’s assumptions and identifies faulty logic or flawed analysis.
  • Assesses the strength of the evidence base or the quality of your information Identifies alternative options or outcomes and/or explores the consequences of an action or attack plan.
  • Tests your system, network, applications and more through the eyes of an adversary.
  • Understands the options for an adversary to break into and move throughout your system.

Role of a Red Team

This is a designated group that tests the security posture of your organization to see how it will fair against real-time attacks – before it actually happens. Hiring people with different backgrounds and specialties helps to round out your security red team to ensure you are testing and seeing your company form the various perspectives of an attacker.

Your Red Team should periodically challenge your security measures throughout the year. Primarily their job will be testing your infrastructure to see how it’d hold up against different attack methodologies without giving notice to fellow employees. But also, it’s worthwhile to have your Red Team test your organization after implementing a new security software or program to the mix.


Red Team vs. Penetration Tester

Penetration Testers are a must have for any organization. This is a designated person who will ethically hack and evaluate your environment. In this role they will be the point of contact and operate as the brains behind your security scope.

While it’s good to have someone in place to handle this – keeping up with the number of tests needed is growing to be too much for one individual to handle. The number of attacks are growing and the amount of research and experience that’s required to get ahead of these attacks is increasing the gap between time of attack and time of discovery. That’s where red teaming comes in. Hiring a group of individuals to test and monitor with full visibility into your security posture routinely and consistently better ensures you have the appropriate measures in place to secure your organization.


Hardware Toolkit List :


  • Lock picks (pocket) - commonly used picks
  • Under-the-door tool
  • Canned air, hand warmers (request-to-exit bypass, etc.)
  • Shove knife/shrum tool
  • -Crash bar tool
  • Dimple lock gun
  • Tubular lock picks
  • Fire/emergency elevator key set
  • USB keylogger and Hak5 rubber ducky
  • Hak5 LAN turtle
  • Pineapple nano
  • LAN tap
  • Wafer and warded pick set
  • Laptop or mobile device
  • External hard drive
  • Fake letter of authorization (as a plan B and to test incident response)
  • Real letter of authorization
  • Props for guises if utilizing social engineering
  • RFID thief/cloner (something that is easy to hide - I often use a clipboard like the one shown in the picture above)
  • Camera (or just use your smartphone)
  • Lock picks (pocket) - common
  • Lock picks (backpack) - expanded set
  • Under-the-door tool
  • Shove knife/shrum tool
  • Crash bar tool
  • Snap gun with interchangeable needles
  • Dimple lock gun
  • Tubular lock picks
  • Hand warmers/canned air
  • Leather gloves/good shoes
  • Fire/emergency elevator key set
  • USB keylogger and Hak5 rubber ducky
  • Hak5 LAN turtle
  • LAN tap
  • Wafers and warded pick set
  • Laptop if needed
  • External hard drive
  • Malicious drops x4 (USB, etc.)
  • Rogue access point (PwnPlug, Pi, whatever your flavor of choice)
  • Hak5 pineapple
  • 15dbi wireless antenna (for outside, not really something you want to stuff in your bag inside).
  • Nexus 7 with nethunter, TP-link adapter etc.
  • Props for guises if utilizing social engineering
  • Fake letter of authorization (as a plan B and to test incident response)
  • Real letter of authorization
  • RFID thief/cloner
  • Camera (or just use your smartphone)
  • Snake camera (a bonus for looking over drop ceilings or floors)
  • Multi-tool

A few example resource links for some of the above tools

Miscellanies Considerations

  • Various USB cables (A, B, mini, micro, OTG, etc.)
  • SD Cards, microSD cards
  • Smartphone (earpiece if with a team)
  • Body camera (GoPro/ACE Cameras are sometimes handy with client approval)
  • Extra power packs/batteries
  • Small flashlight (low lumen)
  • RTFM: Red Team Field Manual

Book :


Contact :



Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].