🥷
Red
search
⌘Ctrlk
🥷
Red
  • 🟥Overview
  • 📚Education
  • Setup
    • ctf setup
    • Exploitation Frameworks
    • Learning Offense
    • rando
  • â­•Attacker Lifecycle
    • Steps
  • Bug Bounty
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Setup

Exploitation Frameworks

LogoMetasploit | Penetration Testing Software, Pen Testing Security | MetasploitMetasploitchevron-right
LogoCobalt Strike | Adversary Simulation and Red Team OperationsCobalt Strikechevron-right
LogoGitHub - its-a-feature/Mythic: A collaborative, multi-platform, red teaming frameworkGitHubchevron-right
LogoGitHub - byt3bl33d3r/SILENTTRINITY: An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLRGitHubchevron-right
LogoBrute Ratel C4Brute Ratel C4chevron-right
LogoGitHub - BishopFox/sliver: Adversary Emulation FrameworkGitHubchevron-right
LogoGitHub - Ne0nd0g/merlin: Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.GitHubchevron-right
Previousctf setupchevron-leftNextLearning Offensechevron-right

Last updated 2 years ago