Red Team Simulation Toolkit & All Free Red Teaming Tools For Red Team Operations 2022

Table of Contents


Active Intelligence Gathering

Passive Intelligence Gathering





Watering Hole Attack

Command and Control

Remote Access Tools


Lateral Movement

Establish Foothold

Escalate Privileges

Domain Escalation

Local Escalation

Data Exfiltration


Adversary Emulation

Wireless Networks

Embedded & Peripheral Devices Hacking

  • magspoof a portable device that can spoof/emulate any magnetic stripe, credit card or hotel card “wirelessly”, even on standard magstripe (non-NFC/RFID) readers.
  • WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible in a short period of time with being as stealth as possible.
  • P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W (required for HID backdoor).
  • malusb HID spoofing multi-OS payload for Teensy.
  • Fenrir is a tool designed to be used “out-of-the-box” for penetration tests and offensive engagements. Its main feature and purpose is to bypass wired 802.1x protection and to give you an access to the target network.
  • poisontap exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
  • WHID WiFi HID Injector – An USB Rubberducky / BadUSB On Steroids.
  • PhanTap is an ‘invisible’ network tap aimed at red teams. With limited physical access to a target building, this tap can be installed inline between a network device and the corporate network.

Software For Team Communication

  • RocketChat is free, unlimited and open source. Replace email & Slack with the ultimate team chat software solution.
  • Etherpad is an open source, web-based collaborative real-time editor, allowing authors to simultaneously edit a text document

Log Aggregation

C# Offensive Framework




Leave a Reply

Your email address will not be published. Required fields are marked *