πŸ₯·
Red
search
⌘Ctrlk
πŸ₯·
Red
  • πŸŸ₯Overview
  • β­•Attacker Lifecycle
    • Steps
  • πŸ“šEducation
    • 🧐Guides
    • πŸ‹οΈTraining
    • πŸ“•Books
    • πŸ₯³Conventions
    • πŸ“°News
    • πŸ—οΈPhysical Tools
    • πŸ—£οΈPodcasts
    • πŸ“ΉYT Channels
    • Setup
      • ctf setup
      • Exploitation Frameworks
      • Learning Offense
      • rando
  • Bug Bounty
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. πŸ“šEducationchevron-right
  2. Setup

Exploitation Frameworks

LogoMetasploit | Penetration Testing Software, Pen Testing Security | MetasploitMetasploitchevron-right
LogoCobalt Strike | Adversary Simulation and Red Team OperationsCobalt Strikechevron-right
LogoGitHub - its-a-feature/Mythic: A collaborative, multi-platform, red teaming frameworkGitHubchevron-right
LogoGitHub - byt3bl33d3r/SILENTTRINITY: An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLRGitHubchevron-right
LogoBrute Ratel C4Brute Ratel C4chevron-right
LogoGitHub - BishopFox/sliver: Adversary Emulation FrameworkGitHubchevron-right
LogoGitHub - Ne0nd0g/merlin: Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.GitHubchevron-right
Previousctf setupchevron-leftNextLearning Offensechevron-right

Last updated 2 years ago