Showing 43 open source projects for "red team"

View related business solutions
  • All Things Performance and Partner Marketing, All in One Place Icon
    All Things Performance and Partner Marketing, All in One Place

    Track calls, leads, and clicks without the manual work

    Automatically tie revenue back to campaigns, channels, publishers, and networks through marketing attribution. Spend less time juggling reports, and more time optimizing for growth by using a single operating solution for partner and performance marketing.
    Learn More
  • The All-In-One Google Workspace Management Tool for IT Admins Icon
    The All-In-One Google Workspace Management Tool for IT Admins

    Our advanced administration makes adding, deleting, suspending, and de-provisioning users simple and quick.

    gPanel by Promevo streamlines administration, security, and user management, giving organizations full control over their Google Workspace.
    Learn More
  • 1
    Rogue

    Rogue

    AI Agent Evaluator & Red Team Platform

    Rogue is an open-source evaluation and red-team framework designed to test the reliability, safety, and policy compliance of AI agents. The platform automatically interacts with an AI agent by generating dynamic scenarios and multi-turn conversations that simulate real-world interactions. Instead of relying solely on static test scripts, Rogue uses an agent-as-a-judge architecture where one agent probes another agent to detect failures or unexpected behaviors.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    Counter-Strike: Football

    Counter-Strike: Football

    Multiplayer FPS game - Counter-Strike: Football

    Competitive multiplayer FPS game where two football fan teams fight with the goal of winning more rounds than the opponent team. Teams are Attackers and Defenders. The Defenders team has a goal of protecting their fan base sanctuary every round from desecrating by attackers using their graffiti bomb ball.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    VIPER

    VIPER

    AI-powered red team platform for adversary simulation toolkit

    Viper is a comprehensive red teaming and adversary simulation platform designed to support cybersecurity professionals in conducting advanced security assessments. It integrates a wide range of tools and capabilities required for penetration testing, post-exploitation, and attack simulation workflows into a unified environment. Viper emphasizes ease of use through a graphical interface, allowing users to manage complex operations without relying solely on command-line tools. It includes a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    PentAGI

    PentAGI

    Perform penetration testing tasks

    PentAGI is a fully autonomous AI agent system designed to perform complex penetration testing tasks by orchestrating multiple intelligent components into a coordinated offensive security workflow. The platform aims to automate significant portions of the penetration testing lifecycle, including reconnaissance, vulnerability discovery, and exploitation planning, reducing the amount of manual effort required from security professionals. It leverages agent-based architecture and AI reasoning to...
    Downloads: 23 This Week
    Last Update:
    See Project
  • Safety Compliance Made Easy Icon
    Safety Compliance Made Easy

    SiteDocs is a digital safety management software used to support work site compliance.

    Ideally designed for business that deals with Construction, Oil & Gas, Mining, Manufacturing, Mechanical, Electrical, Plumbing, Heating, and Excavating, SiteDocs is a perfect solution for any size business looking to modernize the way Safety Compliance is organized.
    Learn More
  • 5
    Commando VM

    Commando VM

    Complete Mandiant Offensive VM (Commando VM)

    Commando VM (by Mandiant) is a Windows-based offensive security / red-team distribution built to turn a fresh Windows installation into a fully featured penetration testing environment. It provides an automated installer (PowerShell script) that uses Chocolatey, Boxstarter, and MyGet package feeds to download, install, and configure dozens (100+ / 170+ depending on version) of offensive, fuzzing, enumeration, and exploitation tools.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 6
    Internal All The Things

    Internal All The Things

    Active Directory and Internal Pentest Cheatsheets

    Internal All The Things is a large, community-driven cheat-sheet and documentation repository focused on internal network penetration testing and Active Directory (AD) exploitation. It covers a broad range of topics; AD certificate services, Kerberos attacks, lateral movement, tooling, post-exploitation techniques, and networking. The content is designed to help both learners and experienced red-teamers fill gaps in their internal pentest knowledge, especially for environments where AD and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    theHarvester

    theHarvester

    E-mails, subdomains and names

    theHarvester is a very simple to use, yet powerful and effective tool designed to be used in the early stages of a penetration test or red team engagement. Use it for open source intelligence (OSINT) gathering to help determine a company's external threat landscape on the internet. The tool gathers emails, names, subdomains, IPs and URLs using multiple public data sources.
    Downloads: 46 This Week
    Last Update:
    See Project
  • 8
    XRAY

    XRAY

    XRay for recon, mapping and OSINT gathering from public networks

    ...It provides a framework for writing and executing inspection modules that can parse structured data (JSON, XML, HTML), traverse graphs of endpoints, and perform intelligent probing guided by discovered surface area. XRay is typically used as a reconnaissance and vulnerability discovery engine in red-team or app-security workflows: it leverages extensible plugins to adapt to different protocols, inject payloads, and detect common bug classes such as injection flaws, misconfigurations, and unsafe endpoints. The modular architecture means users can customize or extend the engine with new analyzers, fuzzers, or output formats tailored to specific testing environments. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9
    Splunk Attack Range

    Splunk Attack Range

    A tool that allows you to create vulnerable environments

    The Splunk Attack Range is an open-source project maintained by the Splunk Threat Research Team. It builds instrumented cloud (AWS, Azure) and local environments (Virtualbox), simulates attacks, and forwards the data into a Splunk instance. This environment can then be used to develop and test the effectiveness of detections.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Junie, the AI coding agent by JetBrains Icon
    Junie, the AI coding agent by JetBrains

    Your smart coding agent

    Junie is an AI-powered coding agent developed by JetBrains designed to enhance developer productivity by integrating directly into popular IDEs such as IntelliJ IDEA, PyCharm, and Android Studio. It supports developers by assisting with code completion, testing, and inspections, ensuring code quality and reducing debugging time.
    Learn More
  • 10
    Sliver

    Sliver

    Adversary Emulation Framework

    Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. Sliver's implants support C2 over Mutual TLS (mTLS), WireGuard, HTTP(S), and DNS and are dynamically compiled with per-binary asymmetric encryption keys. The server and client support MacOS, Windows, and Linux. Implants are supported on MacOS, Windows, and Linux (and possibly every Golang compiler target but we've not tested them all).
    Downloads: 84 This Week
    Last Update:
    See Project
  • 11
    RedAmon

    RedAmon

    AI-powered framework for automated penetration testing and red teaming

    RedAmon is an AI-powered red team framework designed to automate offensive cybersecurity operations from reconnaissance to exploitation and post-exploitation. It combines artificial intelligence with traditional penetration testing tools to create a fully autonomous pipeline capable of discovering vulnerabilities and executing security assessments without human intervention.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 12
    Ignite

    Ignite

    Infinite Red's cutting edge React Native project boilerplate

    The culmination of five years of constant React Native development, Ignite is the most popular React Native app boilerplate for both Expo and bare React Native. This is the React Native boilerplate that the Infinite Red team uses on a day-to-day basis to build client apps. Developers who use Ignite report that it saves them two to four weeks of time on average off the beginning of their React Native project! Ignite apps include rock-solid technical decisions out of the box, like React Native, React Navigation 5, MobX-State-Tree (Why not Redux?), MobX-React-Lite, TypeScript, AsyncStorage (integrated with MST for restoring state), apisauce (to talk to REST servers), Flipper-ready, Reactotron-ready (and pre-integrated with MST), supports Expo out of the box, and more! ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 13
    Pacu

    Pacu

    The AWS exploitation framework, designed for testing security

    ...Written in Python 3 with a modular architecture, Pacu has tools for every step of the pen testing process, covering the full cyber kill chain. Pacu is the aggregation of all of the exploitation experience and research from our countless prior AWS red team engagements. Automating components of the assessment not only improves efficiency but also allows our assessment team to be much more thorough in large environments. What used to take days to manually enumerate can be now be achieved in minutes. There are currently over 35 modules that range from reconnaissance, persistence, privilege escalation, enumeration, data exfiltration, log manipulation, and miscellaneous general exploitation.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14
    HexStrike AI MCP Agents

    HexStrike AI MCP Agents

    HexStrike AI MCP Agents is an advanced MCP server

    ...It ships with curated tool adapters, task orchestration, and guidance for connecting popular agent clients (Claude, GPT, Copilot) to a hardened execution environment. Documentation highlights the breadth of supported utilities and positions HexStrike as a research and red-team aid, not a point-and-click exploit kit. A public site and active repository activity signal an expanding community around autonomous security research agents.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 15
    DeepEval
    DeepEval is a simple-to-use, open-source LLM evaluation framework, for evaluating and testing large-language model systems. It is similar to Pytest but specialized for unit testing LLM outputs. DeepEval incorporates the latest research to evaluate LLM outputs based on metrics such as G-Eval, hallucination, answer relevancy, RAGAS, etc., which uses LLMs and various other NLP models that run locally on your machine for evaluation. Whether your application is implemented via RAG or fine-tuning,...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    PoshC2

    PoshC2

    C2 framework used to aid red teamers with post-exploitation

    PoshC2 is a proxy-aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral movement. PoshC2 is primarily written in Python3 and follows a modular format to enable users to add their own modules and tools, allowing an extendible and flexible C2 framework. Out-of-the-box PoshC2 comes PowerShell/C# and Python2/Python3 implants with payloads written in PowerShell v2 and v4, C++ and C# source code, a variety of executables, DLLs and raw shellcode in...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    JakiKaliOS

    JakiKaliOS

    JakiKaliOS V.0.01 is a LiveRAM Debian distribution based on Kali Linux

    JakiKaliOS is a LiveRAM Linux distribution based on Kali Linux, designed for cybersecurity professionals, ethical hackers, forensic analysts, and laboratory environments. The system runs entirely in RAM by default, leaving no disk footprint and providing fast, clean, and temporary work sessions ideal for security testing and controlled operations. JakiKaliOS includes a lightweight XFCE desktop optimized for performance and low resource usage, suitable for virtual machines, VPS consoles,...
    Leader badge
    Downloads: 20 This Week
    Last Update:
    See Project
  • 18
    MentoLiga

    MentoLiga

    Football/Soccer Leagues Manager

    Manages the Football/Soccer! Creates, Manages any type of leagues. Manage multiple leagues. Tracking the league round to round. Results, standings, scorers, assists, disciplinary, substitutions, minutes played, recoveries, injuries, own goals, results table, play off and betting. Easy Data Entry System. (Automatic and Multi-Selection) League statistics. Disciplinary statistics. Statistics x Match. Automatic or manual fixtures. Search Engine. Filters GK - DEF - MID -...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 19
    VcenterKit

    VcenterKit

    Vcenter Comprehensive Penetration and Exploitation Toolkit

    VcenterKit is a Python-based toolkit focused on penetration testing and exploitation targeting VMware vCenter environments, giving security researchers and red team professionals a consolidated toolset to assess and exploit known vulnerabilities. The project includes modules that automate the detection and exploitation of specific CVEs (common vulnerabilities and exposures) in vCenter servers, often used to manage virtual infrastructure in enterprise environments. With features tailored toward reconnaissance, vulnerability triggering, and payload generation, the toolkit helps testers simulate real-world attack vectors on vulnerable vCenter instances. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Tria Sistema Operatiu

    Tria Sistema Operatiu

    Helps you find, download & burn the best Operating System for any PC

    Tria O.S. detects hard & soft specs of the PC where you run it, you can load this info or specify it manually to let the program inform you what would be the best operating system for a specific PC, with the specified hardware, and then see the difference by adding RAM, a SSD hard drive, changing the graphics card ... etc. REQUIREMENTS: For Linux, you need GAMBAS 3.3 or later, so you will have to install the gambas3 package before installing. 90's EDITION needs 160 MB (192 MB on...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 21
    HackTools

    HackTools

    The all-in-one Red Team extension for Web Pentesters

    The all-in-one Red Team browser extension for Web Pentesters. HackTools, is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverse shells and much more. With the extension you no longer need to search for payloads in different websites or in your local storage space, most of the tools are accessible in one click.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Offensive Reverse Shell

    Offensive Reverse Shell

    Collection of reverse shells for red team operations

    The Offensive Reverse Shell Cheat Sheet is a compilation of reverse shell payloads useful for red team operations and penetration testing. It provides ready-to-use code snippets in various programming languages, facilitating the establishment of reverse shells during security assessments.​
    Downloads: 17 This Week
    Last Update:
    See Project
  • 23
    RedELK

    RedELK

    Red Team's SIEM - tool for Red Teams used for tracking and alarming

    RedELK is a tracking and monitoring tool for Red Teams, providing insights into engagements and supporting real-time situational awareness for offensive operations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Alan Framework

    Alan Framework

    A C2 post-exploitation framework

    Alan Framework is a post-exploitation framework useful during red-team activities. You can run your preferred tool directly in-memory. JavaScript script execution (in-memory without third party dependency) Fully compliant SOCKS5 proxy. Supported agent types: Powershell (x86/x64), DLL (x86/x64), Executable (x86/x64), Shellcode (x86/x64). Server.exe can be executed in Linux (via dotnet core) The network communication is fully encrypted with a session key not recoverable from the agent binary or from a traffic dump. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    0xsp Mongoose RED for Windows

    0xsp Mongoose RED for Windows

    Framework for cybersecurity simulation and red teaming operations

    0xsp mongoose red version is provided to assist your needs during cyber security simulation, by using this version you will be able to audit a targeted Windows operation system for system vulnerabilities, misconfiguration, and privilege escalation attacks and replicate the tactics and techniques of an advanced adversary in a network. With node js support for web application API, it becomes much easier for installation and customization in a timely manner, the windows sensor agent will...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB