Red Team and Blue Team Tools
A curated list of commonly used Red Team and Blue Team tools, grouped by attack lifecycle and defensive function.
🔴 Red Team Tools
Collection
BloodHound – Active Directory visualisation
linWinPwn – Active Directory enumeration and vulnerability checks
Snaffler – Active Directory credential collector
Command and Control
Brute Ratel – Command and control framework ($$$)
Covenant – Command and control framework (.NET)
Havoc – Command and control framework
Merlin – Command and control framework (Golang)
Metasploit Framework – Command and control framework (Ruby)
Pupy – Command and control framework (Python)
Credential Access
Mimikatz – Windows credential extractor
LaZagne – Local password extractor
hashcat – Password hash cracking
John the Ripper – Password hash cracking
SCOMDecrypt – SCOM credential decryption tool
nanodump – LSASS process minidump creation
eviltree – Tree remake for credential discovery
SeeYouCM-Thief – Cisco phone configuration file parsing
MailSniper – Microsoft Exchange mail searcher
Defense Evasion
Alcatraz – GUI x64 binary obfuscator
AMSI Fail – PowerShell snippets that disable AMSI
Invoke-Obfuscation – Script obfuscator
Mangle – Compiled executable manipulation
SharpBlock – EDR bypass via entry point execution prevention
Veil – Metasploit payload obfuscator
Discovery
adidnsdump – AD-integrated DNS dumping
ADRecon – Active Directory reconnaissance
PCredz – Credential discovery from PCAP/live traffic
PingCastle – Active Directory security assessor
Seatbelt – Local vulnerability scanner
scavenger – Scanning tool for scavenging systems
Execution
demiguise – HTA encryption tool
Donut – In-memory .NET execution
evil-winrm – WinRM shell
Macro_pack – Macro obfuscation
PowerSploit – PowerShell exploitation framework
Responder – LLMNR, NBT-NS, MDNS poisoner
Rubeus – Active Directory abuse tool
secretsdump – Remote hash dumper
SharpUp – Windows vulnerability identifier
SQLRecon – Offensive MS-SQL toolkit
StarFighters – JavaScript/VBScript Empire launcher
UltimateAppLockerByPassList – AppLocker bypass techniques
Exfiltration
GD-Thief – Google Drive exfiltration
Cloakify – Data transformation for exfiltration
Dnscat2 – DNS tunneling C2
Powershell RAT – Python-based backdoor
PyExfil – Data exfiltration proof-of-concept
Impact
Conti Pentester Guide Leak – Conti ransomware affiliate toolkit
SlowLoris – Denial-of-service tool
usbkill – Anti-forensic kill switch
Initial Access
Bash Bunny – USB attack platform
EvilGoPhish – Phishing campaign framework
Hydra – Brute-force tool
King Phisher – Phishing campaign framework
SquarePhish – OAuth/QR phishing framework
The Social-Engineer Toolkit – Phishing framework
Lateral Movement
ADFSpoof – Forge AD FS tokens
crackmapexec – Active Directory lateral movement toolkit
Coercer – Force Windows authentication
Enabling RDP – RDP enable command
Forwarding Ports – Local port forwarding
Jenkins reverse shell – Jenkins shell command
kerbrute – Kerberos brute forcing
LiquidSnake – Fileless lateral movement
PowerLessShell – Remote PowerShell without PowerShell
PsExec – Remote command execution
Upgrading shell to meterpreter – Reverse shell upgrade
WMIOps – WMI remote commands
Persistence
Empire – Post-exploitation framework
Impacket – Python networking toolkit
ligolo-ng – Tunneling tool using TUN interface
SharPersist – Windows persistence toolkit
Privilege Escalation
ADFSDump – AD FS dump tool
Certify – Active Directory privilege escalation
Get-GPPPassword – Windows password extraction
ImpulsiveDLLHijack – DLL hijack tool
LinPEAS – Linux privilege escalation
linux-smart-enumeration – Linux privilege escalation
Sherlock – PowerShell privilege escalation
Watson – Windows privilege escalation
WinPEAS – Windows privilege escalation
Reconnaissance
AORT – Subdomain enumeration
AWSBucketDump – S3 bucket enumeration
certSniff – Certificate transparency sniffer
CloudBrute – Cloud infrastructure brute forcing
crt.sh → httprobe → EyeWitness – Automated domain screenshotting
Dismap – Asset discovery
dnsrecon – DNS enumeration
enum4linux – Windows/Samba enumeration
feroxbuster – Content discovery
GitHarvester – GitHub credential search
Gitrob – GitHub sensitive data scanner
gobuster – Path brute forcing
gowitness – Web screenshot utility
jsendpoints – DOM link extraction
Metabigor – OSINT tool
nuclei – Vulnerability scanner
Shodan.io – Internet-exposed asset search
skanuvaty – High-speed network scanner
spoofcheck – SPF/DMARC checker
truffleHog – GitHub credential scanner
Resource Development
Chimera – PowerShell obfuscation
Freeze – Payload creation (EDR evasion)
HTA – HTA payloads
msfvenom – Payload generation
Shellter – Dynamic shellcode injection
VBA – VBA payloads
WordSteal – NTLM hash stealing via Word
WSH – Windows Script Host payloads
🔵 Blue Team Tools
Communication and Collaboration
Facebook ThreatExchange – Malicious indicator sharing
Cyber Security Accounts (Twitter)
Data Recovery
Extundelete – ext3/ext4 recovery
Recuva – File recovery
TestDisk – Data recovery
Digital Forensics
Autopsy – Digital forensics platform
SANS SIFT – Forensics toolkit
The Sleuth Kit – Disk image analysis
Incident Response Planning
Incident Response Plan
NIST Cybersecurity Framework
Ransomware Response Plan
Malware Detection and Analysis
Ghidra – Reverse engineering
IDA – Disassembler/debugger
VirusTotal – IOC sharing platform
Network Discovery and Mapping
Angry IP Scanner
Masscan
Nmap
Nuclei
Shodan
ZMap
Security Monitoring
AutorunsToWinEventLog – Autoruns event parsing
Kibana – Data visualization
Logstash – Data collection
maltrail – Malicious traffic detection
parsedmarc – DMARC visualization
Phishing Catcher – Certstream phishing detection
procfilter – YARA-based process denial
Sysmon – System monitoring
SysmonSearch – Sysmon log analysis
velociraptor – Endpoint visibility
Threat Intelligence
Maltego – Threat intelligence platform
MISP – Malware information sharing
ThreatConnect – Threat data aggregation
Threat Tools and Techniques
chainsaw – Windows forensic artefact search
EmailAnalyzer – Suspicious email analysis
filesec.io – Attacker file extensions
freq – DGA malware detection
gtfobins.github.io – Linux LOLBins
KQL Search – KQL query aggregator
lolbas-project.github.io – Windows LOLBins
Unprotect Project – Malware evasion techniques
VCG – Code security scanning
yarGen – YARA rule generator
Vulnerability Management
HackerOne – Bug bounty management
Nessus Essentials – Vulnerability scanner
Nexpose – Vulnerability management
OpenVAS – Open-source vulnerability scanner
Last updated