🥷
Red
CtrlK
  • 🟥Overview
  • 📚Education
  • Setup
    • ctf setup
    • Exploitation Frameworks
    • Learning Offense
    • rando
  • ⭕Attacker Lifecycle
    • Steps
  • Bug Bounty
Powered by GitBook
On this page
  1. Setup

Exploitation Frameworks

LogoMetasploit | Penetration Testing Software, Pen Testing Security | MetasploitMetasploit
LogoCobalt Strike | Adversary Simulation and Red Team OperationsCobalt Strike
LogoGitHub - its-a-feature/Mythic: A collaborative, multi-platform, red teaming frameworkGitHub
LogoGitHub - byt3bl33d3r/SILENTTRINITY: An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLRGitHub
LogoBrute Ratel C4Chetan Nayak
LogoGitHub - BishopFox/sliver: Adversary Emulation FrameworkGitHub
LogoGitHub - Ne0nd0g/merlin: Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.GitHub
Previousctf setupNextLearning Offense

Last updated 2 years ago