The Red Team Toolkit is one application open source, containing useful offensive tools used by red teamers to identify vulnerabilities and multiple security gaps.
Contains open source tools such as nmap, rustscan, dirsearch, shredder, circl, crowbar, etc. where they are used as a powerful tool kit together.
It currently supports the following options:
- FullScan (port and vulnerability scan/cve on target – PDF output)
- Livehosts (scan all active network-wide servers - Save to PDF)
- DirScan (scan all directories to a target - Save to PDF)
- CVE Description (search for a CVE-ID and get information)
- SSH Dictionary Attack
- RDP BruteForce
- HTTP Verb Tampering
- Web Apps section
- Linux module for exploiting CVE for Linux
- Windows module for Windows CVE exploitation
Installation
$ sudo add-apt-repository ppa:longsleep/golang-backports $ sudo apt Update && sudo apt install python3-pip python3-venv python3-django golang-go postgresql postgresql-contrib nmap git openvpn freerdp2-x11 tigervnc-viewer $ git clone https://github.com/signorrayan/RedTeam_toolkit && cd RedTeam_toolkit $ go install github.com/hakluke/hakrawler@latest $ cp / home /$(whoami)/ go / bin / hakrawler ./toolkit/scripts/webapp
Application snapshots
Contents
hide
-
Full scan
-
RDP BruteForce
-
CVE Description
More information about the installation and use of the prolettertos, you will find here.