Category Archives: RedTeam

BRAWL – Automated Adversary Emulation Exercise

BRAWL seeks to create a compromise by creating a system to automatically create an enterprise network inside a cloud environment.

Donut – Generates Shellcode from .NET Assemblies

Donut is a position-independent code that enables in-memory execution of VBScript, JScript, EXE, DLL files and dotNET assemblies.

Covenant – RedTeam Collaborative .NET C2 Framework

Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft

Attack Range – Tool to Create Vulnerable Instrumented Environment

Attack Range solves two main challenges in development of detections. First, it allows the user to quickly build a small lab infrastructure

Fiddler – Intercepting Web Debugging Proxy

Fiddler is an Intercepting web proxy designed for "web debugging". This will be useful during a penetration testing to verify a web resources.

CloudFrunt – Identify CloudFront Domains Misconfiguration

CloudFrunt is a tool for identifying misconfigured CloudFront domains. CloudFront is a Content Delivery Network (CDN) provided by Amazon Web Services (AWS).

Dr0p1t – Framework to Create Dropper and Bypass most AVs

Dr0p1t is a framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks.