RedHunt-OS V2 – Adversary Emulation & Threat Hunting VM

RedHunt-OS V2 aims to be a one stop shop for all your threat emulation and threat hunting needs by integrating attacker’s arsenal as well as defender’s toolkit to actively identify the threats in your environment.

RedHunt-OS V2 - Virtual Machine for Adversary Emulation and Threat Hunting
RedHunt-OS V2 – Virtual Machine for Adversary Emulation and Threat Hunting

The second version of this distribution include the following update:

  • Removed outdated tools DumpsterFire , Metta, RTA.
  • Added ADRecon tool to extract and combine various artifacts from Active Directory environment.
  • New Categories added: Reporting this section will have Asciinema tool for recording terminal sessions and sharing them on the web. Flameshot screenshot software and cherrytree hierarchical note taking application, featuring rich text and syntax highlighting, storing data in a single xml or sqlite file.

The installation and setup for this framework is by following 5 steps:

  • Download the latest OVA.
  • Import the OVA in VirtualBox.
  • Login using the credentials hunter:hunter.
  • Update the distribution ‘sudo apt-get update && sudo apt-get upgrade’.
  • Configure/Use the tools.

You can read more and download the Virtual machine over here: https://github.com/redhuntlabs/RedHunt-OS

Share